Bug 1315680 (CVE-2016-1286) - CVE-2016-1286 bind: malformed signature records for DNAME records can trigger assertion failure
Summary: CVE-2016-1286 bind: malformed signature records for DNAME records can trigger...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2016-1286
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
: 1318738 (view as bug list)
Depends On: 1315717 1315718 1315719 1315720 1315721 1315722 1316445 1316446 1318949 1318950 1318951 1322285
Blocks: 1315695 1320435 1322722
TreeView+ depends on / blocked
 
Reported: 2016-03-08 12:17 UTC by Martin Prpič
Modified: 2021-02-17 04:13 UTC (History)
11 users (show)

Fixed In Version: bind 9.9.8-P4, bind 9.10.3-P4, bind 9.9.8-S6
Doc Type: Bug Fix
Doc Text:
A denial of service flaw was found in the way BIND parsed signature records for DNAME records. By sending a specially crafted query, a remote attacker could use this flaw to cause named to crash.
Clone Of:
Environment:
Last Closed: 2016-04-06 12:03:46 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2016:0458 0 normal SHIPPED_LIVE Important: bind97 security update 2016-03-16 16:53:36 UTC
Red Hat Product Errata RHSA-2016:0459 0 normal SHIPPED_LIVE Important: bind security update 2016-03-16 17:34:56 UTC
Red Hat Product Errata RHSA-2016:0562 0 normal SHIPPED_LIVE Important: bind security update 2016-03-31 21:56:54 UTC
Red Hat Product Errata RHSA-2016:0601 0 normal SHIPPED_LIVE Important: bind security update 2016-04-06 15:14:35 UTC

Description Martin Prpič 2016-03-08 12:17:16 UTC
The following flaw, reported by ISC, was found in BIND:

An error when parsing signature records for DNAME records having specific properties can lead to named exiting due to an assertion failure in resolver.c or db.c.

An attacker able to cause a server to make a query deliberately chosen to generate a response containing a signature record which would exercise this vulnerability can cause named to stop execution with an assertion failure, resulting in denial of service to clients. Recursive resolvers are at the highest risk of vulnerability to this attack but authoritative-only servers may be also be vulnerable if the attacker can control the answers for records requested when the authoritative server is performing service on zones (e.g. a slave server doing SOA queries.) Servers may be affected even if they are not performing validation or have DNSSEC disabled entirely as long as they receive a response containing offending signature records. Disabling DNSSEC does not provide protection against this vulnerability.

External References:

https://kb.isc.org/article/AA-01353

Comment 1 Martin Prpič 2016-03-08 12:17:20 UTC
Acknowledgments:

Name: ISC

Comment 5 Huzaifa S. Sidhpurwala 2016-03-10 09:11:27 UTC
Public via:

https://kb.isc.org/article/AA-01353

Comment 6 Huzaifa S. Sidhpurwala 2016-03-10 09:36:04 UTC
Created bind tracking bugs for this issue:

Affects: fedora-all [bug 1316445]

Comment 7 Huzaifa S. Sidhpurwala 2016-03-10 09:36:10 UTC
Created bind99 tracking bugs for this issue:

Affects: fedora-all [bug 1316446]

Comment 9 errata-xmlrpc 2016-03-16 12:54:19 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 5

Via RHSA-2016:0458 https://rhn.redhat.com/errata/RHSA-2016-0458.html

Comment 10 errata-xmlrpc 2016-03-16 13:35:44 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7
  Red Hat Enterprise Linux 6
  Red Hat Enterprise Linux 5

Via RHSA-2016:0459 https://rhn.redhat.com/errata/RHSA-2016-0459.html

Comment 13 errata-xmlrpc 2016-03-31 17:57:14 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6.6 Extended Update Support
  Red Hat Enterprise Linux 6.5 Advanced Update Support
  Red Hat Enterprise Linux 6.4 Advanced Update Support

Via RHSA-2016:0562 https://rhn.redhat.com/errata/RHSA-2016-0562.html

Comment 14 Tomáš Hozza 2016-04-01 14:55:00 UTC
*** Bug 1318738 has been marked as a duplicate of this bug. ***

Comment 15 errata-xmlrpc 2016-04-06 11:17:15 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6.2 Advanced Update Support

Via RHSA-2016:0601 https://rhn.redhat.com/errata/RHSA-2016-0601.html


Note You need to log in before you can comment on or make changes to this bug.