Bug 1463132 (CVE-2017-1000381)

Summary: CVE-2017-1000381 c-ares: NAPTR parser out of bounds access
Product: [Other] Security Response Reporter: Andrej Nemec <anemec>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: abhgupta, ahardin, apevec, bleanhar, ccoleman, chrisw, cleaver-redhat, cvsbot-xmlrpc, dedgar, dmcphers, hhorak, jgoulding, jhrozek, jjoyce, joelsmith, jokerman, jorton, jschluet, kseifried, lhh, lpeer, markmc, mchappel, mrunge, nagy.martin, nodejs-sig, rbryant, sclewis, sgallagh, tchollingsworth, tdecacqu, thrcka, tiwillia, valtri, zsvetlik
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: c-ares 1.13.0 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-10-21 11:54:17 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1463133, 1463134, 1463135, 1463136, 1463137, 1470469    
Bug Blocks: 1463140    

Description Andrej Nemec 2017-06-20 08:36:59 UTC
The c-ares function `ares_parse_naptr_reply()`, which is used for parsing
NAPTR responses, could be triggered to read memory outside of the given input
buffer if the passed in DNS response packet was crafted in a particular way.

External References:

https://c-ares.haxx.se/adv_20170620.html

Comment 1 Andrej Nemec 2017-06-20 08:37:29 UTC
Acknowledgments:

Name: Daniel Stenberg
Upstream: LCatro

Comment 2 Andrej Nemec 2017-06-20 08:38:19 UTC
Created mingw-c-ares tracking bugs for this issue:

Affects: epel-7 [bug 1463133]
Affects: fedora-all [bug 1463135]


Created nodejs tracking bugs for this issue:

Affects: epel-all [bug 1463134]
Affects: fedora-all [bug 1463137]
Affects: openshift-1 [bug 1463136]

Comment 5 Stefan Cornelius 2017-07-04 08:24:44 UTC
Patch:
https://c-ares.haxx.se/CVE-2017-1000381.patch

Comment 6 Japheth Cleaver 2017-07-11 22:55:53 UTC
That's two CVE's (this and CVE-2016-5180 in #BZ1387961) applicable to c-ares in EL6. Will this patch be backported, or can the version be rebased?

Comment 8 Tomas Hoger 2018-07-04 15:25:40 UTC
Upstream commit that was applied in 1.13.0:

https://github.com/c-ares/c-ares/commit/9478908a490a6bf009ba58d81de8c1d06d50a117

The above fix introduce a regression that was fixed in 1.14.0:

https://github.com/c-ares/c-ares/commit/18ea99693d63f957ecb670045adbd2c1da8a4641

Comment 10 Tomas Hoger 2018-07-04 15:41:28 UTC
The rh-nodejs6-nodejs packages in Red Hat Software Collections got this problem corrected when they were rebased from version 6.9.1 to 6.11.3 via RHSA-2017:2908:

https://access.redhat.com/errata/RHSA-2017:2908

The rh-nodejs8-nodejs packages in Red Hat Software Collections were first released based on fixed upstream version 8.6.0 and hence were never affected by this issue.