Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1411377 - (CVE-2016-9444) CVE-2016-9444 bind: assertion failure while handling an unusually-formed DS record response
CVE-2016-9444 bind: assertion failure while handling an unusually-formed DS r...
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
high Severity high
: ---
: ---
Assigned To: Red Hat Product Security
Petr Sklenar
impact=important,public=20170111,repo...
: Security
Depends On: 1411417 1411418 1412462 1412463 1457189
Blocks: 1411339
  Show dependency treegraph
 
Reported: 2017-01-09 10:10 EST by Dhiru Kholia
Modified: 2017-07-25 16:46 EDT (History)
5 users (show)

See Also:
Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A denial of service flaw was found in the way BIND handled an unusually-formed DS record response. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2017-07-25 16:46:11 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2017:0062 normal SHIPPED_LIVE Important: bind security update 2017-01-16 05:51:03 EST
Red Hat Product Errata RHSA-2017:1583 normal SHIPPED_LIVE Important: bind security and bug fix update 2017-06-28 09:00:18 EDT

  None (edit)
Description Dhiru Kholia 2017-01-09 10:10:40 EST
An unusually-formed answer containing a DS resource record could trigger an assertion failure. While the combination of properties which triggers the assertion should not occur in normal traffic, it is potentially possible for the assertion to be triggered deliberately by an attacker sending a specially-constructed answer having the required properties.

This vulnerability occurs during the processing of an answer packet received in response to a query. As a result, recursive servers are at the greatest risk; authoritative servers are at risk only to the extent that they perform a limited set of queries.

This description is borrowed from the upstream advisory.
Comment 1 Dhiru Kholia 2017-01-09 10:10:56 EST
Acknowledgments:

Name: ISC
Comment 4 Dhiru Kholia 2017-01-12 00:17:55 EST
Created bind tracking bugs for this issue:

Affects: fedora-all [bug 1412462]
Comment 5 Dhiru Kholia 2017-01-12 00:18:01 EST
Created bind99 tracking bugs for this issue:

Affects: fedora-all [bug 1412463]
Comment 6 Dhiru Kholia 2017-01-12 00:18:42 EST
External References:

https://kb.isc.org/article/AA-01441
Comment 7 errata-xmlrpc 2017-01-16 00:51:39 EST
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2017:0062 https://rhn.redhat.com/errata/RHSA-2017-0062.html
Comment 9 errata-xmlrpc 2017-06-28 05:01:57 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7.2 Extended Update Support

Via RHSA-2017:1583 https://access.redhat.com/errata/RHSA-2017:1583

Note You need to log in before you can comment on or make changes to this bug.