Bug 1411367 (CVE-2016-9147) - CVE-2016-9147 bind: assertion failure while handling a query response containing inconsistent DNSSEC information
Summary: CVE-2016-9147 bind: assertion failure while handling a query response contain...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2016-9147
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact: Petr Sklenar
URL:
Whiteboard:
Depends On: 1411417 1411418 1411680 1411681 1411682 1411684 1412457 1412458 1457187 1467239 1467240 1467241 1467242 1467243
Blocks: 1411339
TreeView+ depends on / blocked
 
Reported: 2017-01-09 14:54 UTC by Dhiru Kholia
Modified: 2021-02-17 02:48 UTC (History)
6 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A denial of service flaw was found in the way BIND handled a query response containing inconsistent DNSSEC information. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response.
Clone Of:
Environment:
Last Closed: 2017-07-25 20:45:21 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2017:0062 0 normal SHIPPED_LIVE Important: bind security update 2017-01-16 10:51:03 UTC
Red Hat Product Errata RHSA-2017:0063 0 normal SHIPPED_LIVE Important: bind security update 2017-01-16 11:01:09 UTC
Red Hat Product Errata RHSA-2017:0064 0 normal SHIPPED_LIVE Important: bind97 security update 2017-01-16 11:31:24 UTC
Red Hat Product Errata RHSA-2017:1583 0 normal SHIPPED_LIVE Important: bind security and bug fix update 2017-06-28 13:00:18 UTC

Description Dhiru Kholia 2017-01-09 14:54:42 UTC
An error handling a query response containing inconsistent DNSSEC information could cause an assertion failure.

Depending on the type of query and the EDNS options in the query they receive, DNSSEC-enabled authoritative servers are expected to include RRSIG and other RRsets in their responses to recursive servers. DNSSEC validating servers will also make specific queries for DS and other RRsets. Whether DNSSEC-validating or not, an error in processing malformed query responses that contain DNSSEC-related RRsets that are inconsistent with other RRsets in the same query response can trigger an assertion failure. Although the combination of properties which triggers the assertion should not occur in normal traffic, it is potentially possible for the assertion to be triggered deliberately by an attacker sending a specially-constructed answer.

This vulnerability occurs during the processing of an answer packet received in response to a query. As a result, recursive servers are at the greatest risk; authoritative servers are at risk only to the extent that they perform a limited set of queries.

This description is borrowed from the upstream advisory.

Comment 1 Dhiru Kholia 2017-01-09 14:54:56 UTC
Acknowledgments:

Name: ISC

Comment 8 Dhiru Kholia 2017-01-12 05:13:01 UTC
Created bind tracking bugs for this issue:

Affects: fedora-all [bug 1412457]

Comment 9 Dhiru Kholia 2017-01-12 05:13:09 UTC
Created bind99 tracking bugs for this issue:

Affects: fedora-all [bug 1412458]

Comment 10 Dhiru Kholia 2017-01-12 05:14:30 UTC
External References:

https://kb.isc.org/article/AA-01440

Comment 11 errata-xmlrpc 2017-01-16 05:51:33 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2017:0062 https://rhn.redhat.com/errata/RHSA-2017-0062.html

Comment 12 errata-xmlrpc 2017-01-16 06:01:35 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 5
  Red Hat Enterprise Linux 6

Via RHSA-2017:0063 https://rhn.redhat.com/errata/RHSA-2017-0063.html

Comment 13 errata-xmlrpc 2017-01-16 06:31:45 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 5

Via RHSA-2017:0064 https://rhn.redhat.com/errata/RHSA-2017-0064.html

Comment 16 errata-xmlrpc 2017-06-28 09:01:51 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7.2 Extended Update Support

Via RHSA-2017:1583 https://access.redhat.com/errata/RHSA-2017:1583


Note You need to log in before you can comment on or make changes to this bug.