Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 14 Sep 2012 06:28:23 GMT
From:      Alexey <alexey@kouznetsov.com>
To:        freebsd-gnats-submit@FreeBSD.org
Subject:   ports/171631: Bind security problem: A Specially Crafted Resource Record Could Cause named to Terminate
Message-ID:  <201209140628.q8E6SNDd003055@red.freebsd.org>
Resent-Message-ID: <201209140630.q8E6UFVX001085@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help

>Number:         171631
>Category:       ports
>Synopsis:       Bind security problem: A Specially Crafted Resource Record Could Cause named to Terminate
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    freebsd-ports-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Fri Sep 14 06:30:15 UTC 2012
>Closed-Date:
>Last-Modified:
>Originator:     Alexey
>Release:        Any
>Organization:
>Environment:
bind 9.0.x -> 9.6.x, 9.4-ESV->9.4-ESV-R5-P1, 9.6-ESV->9.6-ESV-R7-P2, 9.7.0->9.7.6-P2, 9.8.0->9.8.3-P2, 9.9.0->9.9.1-P2
>Description:
http://www.isc.org/software/bind/advisories/cve-2012-4244

-cut-
A nameserver can be caused to exit with a REQUIRE exception if it can be induced to load a specially crafted resource record.

If a record with RDATA in excess of 65535 bytes is loaded into a nameserver, a subsequent query for that record will cause named to exit with an assertion failure.

Please Note: Versions of BIND 9.4 and 9.5 are also affected, but these branches are beyond their "end of life" (EOL) and no longer receive testing or security fixes from ISC.

This vulnerability can be exploited remotely against recursive servers by inducing them to query for records provided by an authoritative server. It affects authoritative servers if a zone containing this type of resource record is loaded from file or provided via zone transfer.
-cut-


>How-To-Repeat:

>Fix:
There are new releases from ISC with fix of the bug
BIND 9 version 9.7.7, 9.7.6-P3
BIND 9 version 9.6-ESV-R8, 9.6-ESV-R7-P3
BIND 9 version 9.8.4, 9.8.3-P3
BIND 9 version 9.9.2, 9.9.1-P3

ports dns/bind9* have top be updated to new release. Same as base system where we have 9.x release too.

>Release-Note:
>Audit-Trail:
>Unformatted:



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201209140628.q8E6SNDd003055>