Bug 939567 (CVE-2015-5477) - VUL-0: CVE-2015-5477: bind: DoS against authoritative and recursive servers
Summary: VUL-0: CVE-2015-5477: bind: DoS against authoritative and recursive servers
Status: RESOLVED FIXED
: 946659 (view as bug list)
Alias: CVE-2015-5477
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P1 - Urgent : Major
Target Milestone: ---
Deadline: 2015-08-03
Assignee: Reinhard Max
QA Contact: Security Team bot
URL:
Whiteboard: CVSSv2:SUSE:CVE-2015-5477:6.8:(AV:N/A...
Keywords:
Depends on:
Blocks:
 
Reported: 2015-07-27 15:11 UTC by Johannes Segitz
Modified: 2022-02-13 11:07 UTC (History)
11 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Comment 1 Johannes Segitz 2015-07-27 15:12:19 UTC
A deliberately constructed packet can exploit an error in the
handling of queries for TKEY records, permitting denial of service.

CVE:                   CVE-2015-5477
Document Version:      1.0
Posting date:          28 July 2015
Program Impacted:      BIND
Versions affected:     9.1.0 -> 9.8.x, 9.9.0->9.9.7-P1, 9.10.0->9.10.2-P2
Severity:              Critical
Exploitable:           Remotely

Description:

    An error in the handling of TKEY queries can be exploited by an
    attacker for use as a denial-of-service vector, as a constructed
    packet can use the defect to trigger a REQUIRE assertion failure,
    causing BIND to exit.

Impact:

    Both recursive and authoritative servers are vulnerable to this
    defect.  Additionally, exposure is not prevented by either ACLs
    or configuration options limiting or denying service because
    the exploitable code occurs early in the packet handling, before
    checks enforcing those boundaries.

    All versions of BIND 9 from BIND 9.1.0 (inclusive) through BIND
    9.9.7-P1 and BIND 9.10.2-P2 are vulnerable.

    Operators should take steps to upgrade to a patched version as
    soon as possible.

CVSS Score:            7.8
CVSS Vector:           (AV:N/AC:L/Au:N/C:N/I:N/A:C)

    For more information on the Common Vulnerability Scoring System
    and to obtain your specific environmental score please visit:

https://nvd.nist.gov/cvss.cfm?calculator&version=2&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:C)


Workarounds:

    None.

Active exploits:

    None known.

Solution:

    Upgrade to the patched release most closely related to your
    current version of BIND.

    BIND 9 version 9.9.7-P2:
ftp://ftp.isc.org/isc/bind9/private/095ae241bfe06d50
    BIND 9 version 9.10.2-P3:
ftp://ftp.isc.org/isc/bind9/private/a810d5d65fbdcf28
Acknowledgements:

    ISC would like to thank Jonathan Foote for discovering and
    disclosing this vulnerability.
Comment 4 Swamp Workflow Management 2015-07-27 17:18:59 UTC
An update workflow for this issue was started.
This issue was rated as important.
Please submit fixed packages until 2015-08-03.
When done, reassign the bug to security-team@suse.de.
https://swamp.suse.de/webswamp/wf/62233
Comment 9 Johannes Segitz 2015-07-28 10:56:37 UTC
CRD: 2015-07-28
Comment 14 Johannes Segitz 2015-07-28 18:40:57 UTC
Issue is public: https://kb.isc.org/article/AA-01272
Comment 15 Swamp Workflow Management 2015-07-28 19:08:20 UTC
SUSE-SU-2015:1304-1: An update that fixes one vulnerability is now available.

Category: security (important)
Bug References: 939567
CVE References: CVE-2015-5477
Sources used:
SUSE Linux Enterprise Software Development Kit 11-SP4 (src):    bind-9.9.6P1-0.12.1
SUSE Linux Enterprise Software Development Kit 11-SP3 (src):    bind-9.9.6P1-0.12.1
SUSE Linux Enterprise Server for VMWare 11-SP3 (src):    bind-9.9.6P1-0.12.1
SUSE Linux Enterprise Server 11-SP4 (src):    bind-9.9.6P1-0.12.1
SUSE Linux Enterprise Server 11-SP3 (src):    bind-9.9.6P1-0.12.1
SUSE Linux Enterprise Server 11-SP2-LTSS (src):    bind-9.9.6P1-0.12.1
SUSE Linux Enterprise Desktop 11-SP4 (src):    bind-9.9.6P1-0.12.1
SUSE Linux Enterprise Desktop 11-SP3 (src):    bind-9.9.6P1-0.12.1
SUSE Linux Enterprise Debuginfo 11-SP4 (src):    bind-9.9.6P1-0.12.1
SUSE Linux Enterprise Debuginfo 11-SP3 (src):    bind-9.9.6P1-0.12.1
Comment 16 Swamp Workflow Management 2015-07-28 19:08:42 UTC
SUSE-SU-2015:1305-1: An update that fixes one vulnerability is now available.

Category: security (important)
Bug References: 939567
CVE References: CVE-2015-5477
Sources used:
SUSE Linux Enterprise Software Development Kit 12 (src):    bind-9.9.6P1-23.1
SUSE Linux Enterprise Server 12 (src):    bind-9.9.6P1-23.1
SUSE Linux Enterprise Desktop 12 (src):    bind-9.9.6P1-23.1
Comment 18 Swamp Workflow Management 2015-07-30 12:07:54 UTC
SUSE-SU-2015:1316-1: An update that fixes one vulnerability is now available.

Category: security (important)
Bug References: 939567
CVE References: CVE-2015-5477
Sources used:
SUSE Linux Enterprise Server 11-SP1-LTSS (src):    bind-9.6ESVR11W1-0.6.1
Comment 19 Johannes Segitz 2015-07-30 12:35:55 UTC
all updates released
Comment 20 Swamp Workflow Management 2015-07-30 16:09:04 UTC
SUSE-SU-2015:1322-1: An update that fixes one vulnerability is now available.

Category: security (important)
Bug References: 939567
CVE References: CVE-2015-5477
Sources used:
SUSE Linux Enterprise Server 10 SP4 LTSS (src):    bind-9.6ESVR11P1-0.14.1
Comment 21 Swamp Workflow Management 2015-07-31 10:09:00 UTC
openSUSE-SU-2015:1326-1: An update that fixes three vulnerabilities is now available.

Category: security (important)
Bug References: 918330,936476,939567
CVE References: CVE-2015-1349,CVE-2015-4620,CVE-2015-5477
Sources used:
openSUSE Evergreen 11.4 (src):    bind-9.9.4P2-66.1
Comment 24 Swamp Workflow Management 2015-08-03 10:08:47 UTC
openSUSE-SU-2015:1335-1: An update that fixes one vulnerability is now available.

Category: security (important)
Bug References: 939567
CVE References: CVE-2015-5477
Sources used:
openSUSE 13.2 (src):    bind-9.9.6P1-2.7.1
openSUSE 13.1 (src):    bind-9.9.4P2-2.14.1
Comment 25 Alexander Naumov 2015-08-06 13:43:09 UTC
Hi,

can somebody tell me how to reproduce this bug?

Thank you,
Alex
Comment 26 Marcus Meissner 2015-08-06 14:31:20 UTC
There is probably a public exploit around somewhere. Google does not find it outright.
Comment 27 Leonardo Chiquitto 2015-10-16 14:51:54 UTC
*** Bug 946659 has been marked as a duplicate of this bug. ***
Comment 28 Swamp Workflow Management 2016-01-25 14:11:57 UTC
SUSE-SU-2016:0227-1: An update that fixes four vulnerabilities is now available.

Category: security (important)
Bug References: 939567,944066,958861,962189
CVE References: CVE-2015-5477,CVE-2015-5722,CVE-2015-8000,CVE-2015-8704
Sources used:
SUSE Linux Enterprise Server 10 SP4 LTSS (src):    bind-9.6ESVR11P1-0.18.1