Bug 999170 - bind: vulnerability in the SRTT algorithm
Summary: bind: vulnerability in the SRTT algorithm
Keywords:
Status: CLOSED WONTFIX
Alias: None
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 999171
TreeView+ depends on / blocked
 
Reported: 2013-08-20 20:55 UTC by Vincent Danen
Modified: 2021-02-17 07:24 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2016-06-10 21:08:00 UTC


Attachments (Terms of Use)

Description Vincent Danen 2013-08-20 20:55:11 UTC
A deficiency in the SRTT (Smoothed Round Trip Time) algorithm in BIND9 was reported that could theoretically allow an attacker to lower the SRTT value that a recursive resolver has associated with an authoritative server.  This could allow the attacker to influence the selection of a specific authoritative server from an NS resource record set with multiple values and thus determine which of multiple authoritative servers for a domain will be queried.

ISC has indicated that they intend to address this deficiency by reimplementing the SRTT algorithm in a future maintenance release of BIND9.  They also note that "the deficiency in the SRTT algorithm is not considered an exploitable security vulnerability on its own".


External References:

https://kb.isc.org/article/AA-01030/169/Operational-Notification-A-Vulnerability-in-the-SRTT-Algorithm-affects-BIND-9-Authoritative-Server-Selection.html

Comment 2 Huzaifa S. Sidhpurwala 2013-08-28 09:13:25 UTC
Statement:

This issue affects the version of bind shipped with Red Hat Enterprise Linux 5 and 6. This issue affects the version of bind97 shipped with Red Hat Enterprise Linux 5. Upstream has indicated that they intend to address this deficiency by reimplementing the SRTT algorithm in a future maintenance release of BIND9.


Note You need to log in before you can comment on or make changes to this bug.