Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1332493 - (CVE-2016-10152) CVE-2016-10152 hesiod: Use of hard-coded unsafe configuration if configuration file cannot be opened
CVE-2016-10152 hesiod: Use of hard-coded unsafe configuration if configuratio...
Status: CLOSED WONTFIX
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
https://github.com/achernya/hesiod/pu...
impact=low,public=20160503,reported=2...
: Security
Depends On: 1332494
Blocks: 1332511
  Show dependency treegraph
 
Reported: 2016-05-03 06:48 EDT by Adam Mariš
Modified: 2017-01-22 20:16 EST (History)
2 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2017-01-22 20:16:50 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)
proposed fix (884 bytes, patch)
2016-05-03 13:16 EDT, Nalin Dahyabhai
no flags Details | Diff

  None (edit)
Description Adam Mariš 2016-05-03 06:48:51 EDT
It was reported that hesiod uses hard-coded default domain name allowing the attacker, that can control the athena.mit.edu zone or one of its parent zones or able to pose as MITM, to supply fake Hesiod data in certain cases, allowing injection of fake root accounts. If Hesiod deployment uses DNSSEC with a trusted, validating recursive resolver to secure Hesiod data, it can result into retrieval of non-DNSSEC-signed Hesiod data, since athena.mit.edu is currently unsigned.

Vulnerable code:

#define DEF_RHS ".athena.mit.edu"
...
/* Try to open the configuration file. */
fp = fopen(filename, "r");
if (!fp)
{
/* Use compiled in default domain names. */
ctx->lhs = malloc(strlen(DEF_LHS) + 1);
ctx->rhs = malloc(strlen(DEF_RHS) + 1);
Comment 1 Adam Mariš 2016-05-03 06:49:00 EDT
Acknowledgments:

Name: Florian Weimer (Red Hat)
Comment 2 Adam Mariš 2016-05-03 06:49:14 EDT
Created hesiod tracking bugs for this issue:

Affects: fedora-all [bug 1332494]
Comment 3 Florian Weimer 2016-05-03 07:28:20 EDT
glibc is not affected by this issue.  DEF_RHS has not been compiled into the library since this change:

commit 2f54c82dacba646139a773ab43fc2cdb47ee1f5b
Author: Ulrich Drepper <drepper@redhat.com>
Date:   Fri Jul 21 04:12:25 2000 +0000

        * hesiod/hesiod.c: Update from BIND 8.2.3-T5B.
Comment 4 Nalin Dahyabhai 2016-05-03 13:16 EDT
Created attachment 1153517 [details]
proposed fix
Comment 5 Doran Moppert 2017-01-17 21:34:05 EST
Statement:

Red Hat Product Security has rated this issue as having Low security
impact. This issue is not currently planned to be addressed in future
updates. For additional information, refer to the Issue Severity
Classification: https://access.redhat.com/security/updates/classification/.

Note You need to log in before you can comment on or make changes to this bug.