Bug 1315674 (CVE-2016-1285) - CVE-2016-1285 bind: malformed packet sent to rndc can trigger assertion failure
Summary: CVE-2016-1285 bind: malformed packet sent to rndc can trigger assertion failure
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2016-1285
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1315717 1315718 1315719 1315720 1315721 1315722 1316445 1316446 1318949 1318950 1318951 1322285
Blocks: 1315695 1320435 1322722
TreeView+ depends on / blocked
 
Reported: 2016-03-08 12:13 UTC by Martin Prpič
Modified: 2021-02-17 04:12 UTC (History)
9 users (show)

Fixed In Version: bind 9.9.8-P4, bind 9.10.3-P4, bind 9.9.8-S6
Doc Type: Bug Fix
Doc Text:
A denial of service flaw was found in the way BIND processed certain control channel input. A remote attacker able to send a malformed packet to the control channel could use this flaw to cause named to crash.
Clone Of:
Environment:
Last Closed: 2016-04-06 12:02:45 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2016:0458 0 normal SHIPPED_LIVE Important: bind97 security update 2016-03-16 16:53:36 UTC
Red Hat Product Errata RHSA-2016:0459 0 normal SHIPPED_LIVE Important: bind security update 2016-03-16 17:34:56 UTC
Red Hat Product Errata RHSA-2016:0562 0 normal SHIPPED_LIVE Important: bind security update 2016-03-31 21:56:54 UTC
Red Hat Product Errata RHSA-2016:0601 0 normal SHIPPED_LIVE Important: bind security update 2016-04-06 15:14:35 UTC

Description Martin Prpič 2016-03-08 12:13:14 UTC
The following flaw, reported by ISC, was found in BIND:

Testing by ISC has uncovered a defect in control channel input handling which can cause named to exit due to an assertion failure in sexpr.c or alist.c when a malformed packet is sent to named's control channel (the interface which allows named to be controlled using the 'rndc" server control utility).

This assertion occurs before authentication but after network-address-based access controls have been applied. Or in other words: an attacker does not need to have a key or other authentication, but does need to be within the address list specified in the "controls" statement in named.conf which enables the control channel. If no "controls" statement is present in named.conf, named still defaults to listening for control channel information on loopback addresses (127.0.0.1 and ::1) if the file rndc.key is present in the configuration directory and contains a valid key.

A search for similar problems revealed an associated defect in the rndc server control utility whereby a malformed response from the server could cause the rndc program to crash. For completeness, it is being fixed at the same time even though this defect in the rndc utility is not in itself exploitable.

All servers are vulnerable if they accept remote commands on the control channel. Servers which are vulnerable can be stopped by an attacker sending the offending packet if the attacker is sending from a system listed within the address list specified in the "controls" statement (or from localhost if the control channel is using the default address list) resulting in denial of service to clients.

Mitigation:

Restrict access to the control channel (by using the "controls" configuration statement in named.conf) to allow connection only from trusted systems.

Note that if no "controls" statement is present, named defaults to allowing control channel connections only from localhost (127.0.0.1 and ::1) if and only if the file rndc.key exists in the configuration directory and contains valid key syntax. If rndc.key is not present and no "controls" statement is present in named.conf, named will not accept commands on the control channel.

External References:

https://kb.isc.org/article/AA-01352

Comment 1 Martin Prpič 2016-03-08 12:13:19 UTC
Acknowledgments:

Name: ISC

Comment 5 Huzaifa S. Sidhpurwala 2016-03-10 09:10:28 UTC
Public via:

https://kb.isc.org/article/AA-01352

Comment 6 Huzaifa S. Sidhpurwala 2016-03-10 09:35:52 UTC
Created bind tracking bugs for this issue:

Affects: fedora-all [bug 1316445]

Comment 7 Huzaifa S. Sidhpurwala 2016-03-10 09:35:58 UTC
Created bind99 tracking bugs for this issue:

Affects: fedora-all [bug 1316446]

Comment 9 errata-xmlrpc 2016-03-16 12:54:11 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 5

Via RHSA-2016:0458 https://rhn.redhat.com/errata/RHSA-2016-0458.html

Comment 10 errata-xmlrpc 2016-03-16 13:35:38 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7
  Red Hat Enterprise Linux 6
  Red Hat Enterprise Linux 5

Via RHSA-2016:0459 https://rhn.redhat.com/errata/RHSA-2016-0459.html

Comment 13 errata-xmlrpc 2016-03-31 17:57:08 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6.6 Extended Update Support
  Red Hat Enterprise Linux 6.5 Advanced Update Support
  Red Hat Enterprise Linux 6.4 Advanced Update Support

Via RHSA-2016:0562 https://rhn.redhat.com/errata/RHSA-2016-0562.html

Comment 14 errata-xmlrpc 2016-04-06 11:17:07 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6.2 Advanced Update Support

Via RHSA-2016:0601 https://rhn.redhat.com/errata/RHSA-2016-0601.html


Note You need to log in before you can comment on or make changes to this bug.