Bug 526185 (CVE-2009-0696) - VUL-0: CVE-2009-0696: BIND: remote DoS
Summary: VUL-0: CVE-2009-0696: BIND: remote DoS
Status: RESOLVED FIXED
Alias: CVE-2009-0696
Product: SUSE Security Incidents
Classification: Novell Products
Component: General (show other bugs)
Version: unspecified
Hardware: Other SuSE Linux 10.1
: P1 - Urgent : Critical
Target Milestone: ---
Deadline: 2009-08-06
Assignee: Security Team bot
QA Contact: Security Team bot
URL:
Whiteboard: maint:released:10.3:26193 maint:relea...
Keywords: security_vulnerability
Depends on:
Blocks:
 
Reported: 2009-07-29 03:25 UTC by Arvind Sakthivel
Modified: 2022-06-09 15:06 UTC (History)
6 users (show)

See Also:
Found By: Other
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments
You may duplicate the package by attached perl. Hope this can help. (690 bytes, text/plain)
2009-07-29 05:02 UTC, Arvind Sakthivel
Details

Note You need to log in before you can comment on or make changes to this bug.
Description Arvind Sakthivel 2009-07-29 03:25:22 UTC
Receipt of a specially-crafted dynamic update message to a zone for which the server is the master may cause BIND 9 servers to exit. Testing indicates that the attack packet has to be formulated against a zone for which that machine is a master. Launching the attack against slave zones does not trigger the assert.

This vulnerability affects all servers that are masters for one or more zones – it is not limited to those that are configured to allow dynamic updates. Access controls will not provide an effective workaround.

dns_db_findrdataset() fails when the prerequisite section of the dynamic update message contains a record of type “ANY” and where at least one RRset for this FQDN exists on the server.

db.c:659: REQUIRE(type != ((dns_rdatatype_t)dns_rdatatype_any)) failed
exiting (due to assertion failure). 



Information available in 
https://www.isc.org/node/474
http://www.kb.cert.org/vuls/id/725188
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0696
Comment 1 Arvind Sakthivel 2009-07-29 05:02:00 UTC
Created attachment 308699 [details]
You may duplicate the package by attached perl. Hope this can help.
Comment 4 Marcus Meissner 2009-07-29 07:06:50 UTC
given the generic remote dos possibility, bump sev and prio
Comment 5 Swamp Workflow Management 2009-07-29 07:29:38 UTC
The SWAMPID for this issue is 26189.
Please submit the patch and patchinfo file using this ID.
(https://swamp.suse.de/webswamp/wf/26189)
Comment 6 Marcus Meissner 2009-07-29 14:09:16 UTC
according to solar designer every bind can be crashed by the exploit, even without ddns updates enabled.
Comment 7 Marius Tomaschewski 2009-07-29 15:46:58 UTC
Applied patches extracted from bind-9.5.1-P3 and submitted fixed
packages with following request IDs to:

966 -> SUSE:openSUSE:10.3:Update:Test
965 -> SUSE:openSUSE:11.0:Update:Test
964 -> SUSE:openSUSE:11.1:Update:Test
963 -> SUSE:SLE-10-SP2:Update:Test
962 -> SUSE:SLE-11:Update:Test

SLES9 follows (verify build still running). Did I forget something?
Comment 8 Marcus Meissner 2009-07-29 15:50:44 UTC
I think we might need an update for SLES 8 too here,

package name there is bind9
Comment 9 Marius Tomaschewski 2009-07-29 16:21:23 UTC
(In reply to comment #6)
> according to solar designer every bind can be crashed by the exploit,
> even without ddns updates enabled.

Yes, see also
https://bugzilla.redhat.com/show_bug.cgi?id=514292#c16

but the fix seems to be correct / I didn't found any hint that
the fix would be incomplete. When this is not correct, please
let me know...

Submitted SLES9 package as well.
Comment 10 Marius Tomaschewski 2009-07-29 16:25:09 UTC
(In reply to comment #8)
> I think we might need an update for SLES 8 too here,
> 
> package name there is bind9

Package is in tait:/space/mt/sles8/bind9, mbuild jobid is 'tait-mt-1'.
Comment 11 Marius Tomaschewski 2009-07-29 16:30:47 UTC
The sles8 package does not have this fix:
-------------------------------------------------------------------
Thu Jan  8 16:08:18 CET 2009 - ug@suse.de

- Security Vulnerability:
  insecure usage of openssl, not checking return values
  (bnc#464462)

-------------------------------------------------------------------
Comment 12 Marius Tomaschewski 2009-07-29 16:41:25 UTC
I've applied the openssl_ret_value_9_3_6.diff fix for above bug too:
bind9 -> SLES8
Comment 13 Marius Tomaschewski 2009-07-29 16:43:48 UTC
OK, back to security-team.

Reassign back / let me know when it is not all, please.
Comment 16 Marcus Meissner 2009-07-30 09:03:54 UTC
I think the severity makes it also necessary to release for LTSS products,

sles9-sp3 and sles10 (sp1)

Marius, can you also submit fixes against those? (sles9 might be difficult since sp4 had a version update, sles10 should be easier).
Comment 17 Ludwig Nussel 2009-07-30 09:08:45 UTC
I've copied the sles10 sp2 version to sp1 and adapted the changelog. all 3 changes between sp1 and sp2 are security related anyways.
Comment 18 Swamp Workflow Management 2009-07-30 13:46:14 UTC
Update released for: bind, bind-chrootenv, bind-debuginfo, bind-debugsource, bind-devel, bind-doc, bind-libs, bind-lwresd, bind-utils
Products:
openSUSE 10.3 (i386, ppc, ppc64, x86_64)
openSUSE 11.0 (debug, i386, ppc, ppc64, x86_64)
openSUSE 11.1 (debug, i586, ppc, ppc64, x86_64)
Comment 19 Marcus Meissner 2009-07-30 19:37:21 UTC
sles10sp2, sles11,sles9 sp4,sles8,boxes released today,
sles10sp1 ltss, sles9 sp3 ltss also queued
Comment 20 Swamp Workflow Management 2009-07-30 22:08:30 UTC
Update released for: bind, bind-chrootenv, bind-devel, bind-doc, bind-libs, bind-lwresd, bind-utils
Products:
SLE-DEBUGINFO 10-SP2 (i386, ia64, ppc, s390x, x86_64)
SLE-DESKTOP 10-SP2 (i386, x86_64)
SLE-SDK 10-SP2 (i386, ia64, ppc, s390x, x86_64)
SLE-SERVER 10-SP2 (i386, ia64, ppc, s390x, x86_64)
Comment 21 Swamp Workflow Management 2009-07-30 22:08:51 UTC
Update released for: bind, bind-chrootenv, bind-debuginfo, bind-debugsource, bind-devel, bind-devel-32bit, bind-doc, bind-libs, bind-libs-32bit, bind-libs-x86, bind-lwresd, bind-utils
Products:
SLE-DEBUGINFO 11 (i386, ia64, ppc64, s390x, x86_64)
SLE-DESKTOP 11 (i386, x86_64)
SLE-SDK 11 (i386, ia64, ppc64, s390x, x86_64)
SLE-SERVER 11 (i386, ia64, ppc64, s390x, x86_64)
Comment 22 Swamp Workflow Management 2009-07-30 22:08:56 UTC
Update released for: bind, bind-devel, bind-utils
Products:
Novell-Linux-Desktop 9 (i386, x86_64)
Novell-Linux-POS 9 (i386)
Open-Enterprise-Server 9 (i386)
SUSE-CORE 9 (i386, ia64, ppc, s390, s390x, x86_64)
Comment 23 Marius Tomaschewski 2009-07-31 13:38:18 UTC
submitted following fixes to sles9-sp3:

- Security Vulnerability:
  Dynamic Update DoS
  (CVE-2009-0696, VU#725188, bnc#526185)
- Security Vulnerability:
  insecure usage of openssl, not checking return values
  (bnc#464462)
- security fix (bug #354671)
  CVE-2008-0122: VU#203611 buffer overflow in inet_network()
- Applied named-bootconf.sh fix to use a mktemp created dir.
Comment 24 Swamp Workflow Management 2009-07-31 22:08:16 UTC
Update released for: bind, bind-chrootenv, bind-devel, bind-doc, bind-libs, bind-lwresd, bind-utils
Products:
SLE-SERVER 10-SP1-LTSS (i386, s390x, x86_64)
Comment 25 Thomas Biege 2009-08-04 07:10:37 UTC
released them all
Comment 26 Swamp Workflow Management 2009-08-04 22:08:16 UTC
Update released for: bind, bind-devel, bind-utils
Products:
SUSE-CORE 9-SP3 (i386, s390x, x86_64)
Comment 27 Marcelo Oliveira 2009-08-20 17:40:52 UTC
what is the current release for SLES 8?
i can't find the link to download this version on the patch finder and the link for the TID here is broken
http://support.novell.com/security/cve/CVE-2009-0696.html
Thanks
Comment 28 Ludwig Nussel 2009-08-21 06:45:10 UTC
no idea how this works for sles8
Comment 29 Marcelo Oliveira 2009-08-21 14:47:10 UTC
The report shows that there is a available version for SLES 8 and the release mentioned is 9.3.4-0.6 but i can't find it anywhere.
That report also points to this bug.
Comment 30 Marcus Meissner 2009-08-24 07:10:03 UTC
sles8 is in extended maintenance, so only a limited set of customers get this patch. (actually there should be 0 customers left according to our data.)

(Customers need to pay this extension, it is not in the general sles subscription.)

The patch itself is available via YOU (online update) only, not via patchbuilder/download.novell.com.

https://you.novell.com/update/i386/update/SuSE-SLES/8-EXTENDED/
Comment 31 Thomas Biege 2009-10-14 02:47:55 UTC
CVE-2009-0696: CVSS v2 Base Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)