Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1420193 - (CVE-2017-3135) CVE-2017-3135 bind: Assertion failure when using DNS64 and RPZ Can Lead to Crash
CVE-2017-3135 bind: Assertion failure when using DNS64 and RPZ Can Lead to Crash
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20170208,repor...
: Security
Depends On: 1420199 1420200 1420607 1420608
Blocks: 1420194
  Show dependency treegraph
 
Reported: 2017-02-08 00:18 EST by Huzaifa S. Sidhpurwala
Modified: 2017-03-07 03:33 EST (History)
7 users (show)

See Also:
Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A denial of service flaw was found in the way BIND handled query responses when both DNS64 and RPZ were used. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure or a null pointer dereference via a specially crafted DNS response.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2017-03-07 03:33:46 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)
Patch between bind-9.9.9-P6 and bind-9.9.9-P5 (21.29 KB, patch)
2017-02-08 00:50 EST, Huzaifa S. Sidhpurwala
no flags Details | Diff


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Knowledge Base (Solution) 2918391 None None None 2017-02-09 22:22 EST
Red Hat Product Errata RHSA-2017:0276 normal SHIPPED_LIVE Moderate: bind security update 2017-02-15 13:12:04 EST

  None (edit)
Description Huzaifa S. Sidhpurwala 2017-02-08 00:18:43 EST
As per upstream advisory:

Under some conditions when using both DNS64 and RPZ to rewrite query responses, query processing can resume in an inconsistent state leading to either an INSIST assertion failure or an attempt to read through a NULL pointer.

Impact:

Servers utilizing both DNS64 and RPZ are potentially susceptible to encountering this condition.  When this condition occurs, it will result in either an INSIST assertion failure (and subsequent abort) or an attempt to read through a NULL pointer.  On most platforms a NULL pointer read leads to a segmentation fault (SEGFAULT), which causes the process to be terminated.

Only servers which are configured to simultaneously use both Response Policy Zones (RPZ) and DNS64 (a method for synthesizing AAAA records from A records) can be affected by this vulnerability.


Mitigation:

While it is possible to avoid the condition by removing either DNS64 or RPZ from the configuration, or by carefully restricting the contents of the policy zone, for an affected configuration the most practical and safest course of action is to upgrade to a version of BIND without this vulnerability.
Comment 1 Huzaifa S. Sidhpurwala 2017-02-08 00:30:42 EST
Acknowledgments:

Name: ISC
Upstream: Ramesh Damodaran (Infoblox) and Aliaksandr Shubnik (Infoblox)
Comment 2 Huzaifa S. Sidhpurwala 2017-02-08 00:50 EST
Created attachment 1248550 [details]
Patch between bind-9.9.9-P6 and bind-9.9.9-P5
Comment 5 Huzaifa S. Sidhpurwala 2017-02-08 23:24:52 EST
Public now via upstream advisory.

External References:

https://kb.isc.org/article/AA-01453
Comment 6 Huzaifa S. Sidhpurwala 2017-02-08 23:39:35 EST
Created bind tracking bugs for this issue:

Affects: fedora-all [bug 1420607]
Comment 7 Huzaifa S. Sidhpurwala 2017-02-08 23:39:43 EST
Created bind99 tracking bugs for this issue:

Affects: fedora-all [bug 1420608]
Comment 15 errata-xmlrpc 2017-02-15 08:12:16 EST
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2017:0276 https://rhn.redhat.com/errata/RHSA-2017-0276.html

Note You need to log in before you can comment on or make changes to this bug.