Bug 970072 (CVE-2016-1285) - VUL-0: CVE-2016-1285: bind: assert failure on input parsing can cause premature exit
Summary: VUL-0: CVE-2016-1285: bind: assert failure on input parsing can cause prematu...
Status: RESOLVED FIXED
Alias: CVE-2016-1285
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P2 - High : Major
Target Milestone: ---
Deadline: 2016-03-22
Assignee: Security Team bot
QA Contact: Security Team bot
URL:
Whiteboard: CVSSv2:RedHat:CVE-2016-1285:5.0:(AV:N...
Keywords:
Depends on:
Blocks: 972838
  Show dependency treegraph
 
Reported: 2016-03-08 14:05 UTC by Victor Pereira
Modified: 2017-09-20 14:35 UTC (History)
6 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---
haral.tsitsivas: needinfo?


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Victor Pereira 2016-03-08 14:05:53 UTC
CVE:                   CVE-2016-1285
Document Version:      1.1
Posting date:          09 March 2016
Program Impacted:      BIND
Versions affected:     9.2.0 -> 9.8.8, 9.9.0->9.9.8-P3, 9.9.3-S1->9.9.8-S5, 9.10.0->9.10.3-P3
Severity:              High
Exploitable:           Remotely (on systems which accept control
                       channel input from remote addresses.)

Description:

   Testing by ISC has uncovered a defect in control channel input
   handling which can cause named to exit due to an assertion
   failure in sexpr.c or alist.c when a malformed packet is sent
   to named's control channel (the interface which allows named to
   be controlled using the 'rndc" server control utility).

   This assertion occurs before authentication but after
   network-address-based access controls have been applied.  Or in
   other words:  an attacker does not need to have a key or other
   authentication, but does need to be within the address list
   specified in the "controls" statement in named.conf which enables
   the control channel.  If no "controls" statement is present in
   named.conf, named still defaults to listening for control channel
   information on loopback addresses (127.0.0.1 and ::1) if the
   file rndc.key is present in the configuration directory and
   contains a valid key.

   A search for similar problems revealed an associated defect in
   the rndc server control utility whereby a malformed response
   from the server could cause the rndc program to crash. For
   completeness, it is being fixed at the same time even though
   this defect in the rndc utility is not in itself exploitable.

Impact:

   All servers are vulnerable if they accept remote commands on
   the control channel.  Servers which are vulnerable can be stopped
   by an attacker sending the offending packet if the attacker is
   sending from a system listed within the address list specified
   in the "controls" statement (or from localhost if the control
   channel is using the default address list) resulting in denial
   of service to clients.

CVSS Score:            7.8
CVSS Vector:           (AV:N/AC:L/Au:N/C:N/I:N/A:C)

   For more information on the Common Vulnerability Scoring System
   and to obtain your specific environmental score please visit:
   http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:C)

Workarounds:

   Restrict access to the control channel (by using the "controls"
   configuration statement in named.conf) to allow connection only
   from trusted systems.

   Note that if no "controls" statement is present, named defaults
   to allowing control channel connections only from localhost
   (127.0.0.1 and ::1) if and only if the file rndc.key exists in
   the configuration directory and contains valid key syntax.  If
   rndc.key is not present and no "controls" statement is present
   in named.conf, named will not accept commands on the control
   channel.

Active exploits:

   No known active exploits.

Solution:

   Upgrade to the patched release most closely related to your
   current version of BIND.

    BIND 9 version 9.9.8-P4
    BIND 9 version 9.10.3-P4

   BIND 9 Supported Preview edition is a feature preview version
   of BIND provided exclusively to eligible ISC Support customers.

    BIND 9 version 9.9.8-S6

Document Revision History:

   1.0 Advance Notification 02 March 2016

   1.1 "Versions affected" and "Solution" text expanded to cover
   BIND 9 Supported Preview Edition, 03 March 2016

Related Documents:

   See our BIND9 Security Vulnerability Matrix at
   https://kb.isc.org/article/AA-00913 for a complete listing of
   Security Vulnerabilities and versions affected.

   If you'd like more information on ISC Subscription Support and
   Advance Security Notifications, please visit
   http://www.isc.org/support/.

   Do you still have questions?  Questions regarding this advisory
   should go to security-officer@isc.org.  To report a new issue,
   please encrypt your message using security-officer@isc.org's
   PGP key which can be found here:
   https://www.isc.org/downloads/software-support-policy/openpgp-key/.
   If you are unable to use encrypted email, you may also report
   new issues at: https://www.isc.org/community/report-bug/.

Note:

   ISC patches only currently supported versions. When possible we
   indicate EOL versions affected.  (For current information on
   which versions are actively supported, please see
   http://www.isc.org/downloads/).

ISC Security Vulnerability Disclosure Policy:

   Details of our current security advisory policy and practice
   can be found here:
   https://kb.isc.org/article/AA-00861/164/ISC-Software-Defect-and-Security-Vulnerability-Disclosure-Policy.html

This Knowledge Base article https://kb.isc.org/article/AA-01352 is
the complete and official security advisory document.

Legal Disclaimer:

   Internet Systems Consortium (ISC) is providing this notice on
   an "AS IS" basis. No warranty or guarantee of any kind is
   expressed in this notice and none should be implied. ISC expressly
   excludes and disclaims any warranties regarding this notice or
   materials referred to in this notice, including, without
   limitation, any implied warranty of merchantability, fitness
   for a particular purpose, absence of hidden defects, or of
   non-infringement. Your use or reliance on this notice or materials
   referred to in this notice is at your own risk. ISC may change
   this notice at any time.  A stand-alone copy or paraphrase of
   the text of this document that omits the document URL is an
   uncontrolled copy. Uncontrolled copies may lack important
   information, be out of date, or contain factual errors.

(c) 2001-2016 Internet Systems Consortium
Comment 1 Swamp Workflow Management 2016-03-08 23:00:58 UTC
bugbot adjusting priority
Comment 4 Reinhard Max 2016-03-09 15:11:39 UTC
Unfortunately the patch does not apply cleanly to 9.6-ESV-R11-W1 on SLE11-SP0. Some large-ish hunks in lib/dns/resolver.c fail, even with fuzz 3 and ignoring white space.
Comment 5 Marcus Meissner 2016-03-10 07:39:36 UTC
public now
Comment 7 Bernhard Wiedemann 2016-03-11 11:00:15 UTC
This is an autogenerated message for OBS integration:
This bug (970072) was mentioned in
https://build.opensuse.org/request/show/369936 13.2 / bind
Comment 8 Bernhard Wiedemann 2016-03-11 14:00:09 UTC
This is an autogenerated message for OBS integration:
This bug (970072) was mentioned in
https://build.opensuse.org/request/show/370068 Factory / bind
Comment 10 Bernhard Wiedemann 2016-03-11 20:00:18 UTC
This is an autogenerated message for OBS integration:
This bug (970072) was mentioned in
https://build.opensuse.org/request/show/370182 Evergreen:11.4+13.1 / bind
Comment 11 Swamp Workflow Management 2016-03-13 13:32:08 UTC
An update workflow for this issue was started.
This issue was rated as important.
Please submit fixed packages until 2016-03-22.
When done, reassign the bug to security-team@suse.de.
https://swamp.suse.de/webswamp/wf/62554
Comment 12 Swamp Workflow Management 2016-03-14 18:12:28 UTC
SUSE-SU-2016:0759-1: An update that fixes two vulnerabilities is now available.

Category: security (important)
Bug References: 970072,970073
CVE References: CVE-2016-1285,CVE-2016-1286
Sources used:
SUSE Linux Enterprise Software Development Kit 12-SP1 (src):    bind-9.9.6P1-38.1
SUSE Linux Enterprise Server 12-SP1 (src):    bind-9.9.6P1-38.1
SUSE Linux Enterprise Desktop 12-SP1 (src):    bind-9.9.6P1-38.1
Comment 13 Swamp Workflow Management 2016-03-15 09:32:14 UTC
An update workflow for this issue was started.
This issue was rated as important.
Please submit fixed packages until 2016-03-22.
When done, reassign the bug to security-team@suse.de.
https://swamp.suse.de/webswamp/wf/62561
Comment 14 Swamp Workflow Management 2016-03-15 20:13:10 UTC
SUSE-SU-2016:0780-1: An update that fixes two vulnerabilities is now available.

Category: security (important)
Bug References: 970072,970073
CVE References: CVE-2016-1285,CVE-2016-1286
Sources used:
SUSE Linux Enterprise Software Development Kit 12 (src):    bind-9.9.6P1-28.12.1
SUSE Linux Enterprise Server 12 (src):    bind-9.9.6P1-28.12.1
SUSE Linux Enterprise Desktop 12 (src):    bind-9.9.6P1-28.12.1
Comment 15 Swamp Workflow Management 2016-03-18 19:20:30 UTC
SUSE-SU-2016:0825-1: An update that fixes two vulnerabilities is now available.

Category: security (important)
Bug References: 970072,970073
CVE References: CVE-2016-1285,CVE-2016-1286
Sources used:
SUSE Linux Enterprise Software Development Kit 11-SP4 (src):    bind-9.9.6P1-0.25.1
SUSE Linux Enterprise Server 11-SP4 (src):    bind-9.9.6P1-0.25.1
SUSE Linux Enterprise Server 11-SP3-LTSS (src):    bind-9.9.6P1-0.25.1
SUSE Linux Enterprise Server 11-SP2-LTSS (src):    bind-9.9.6P1-0.25.1
SUSE Linux Enterprise Desktop 11-SP4 (src):    bind-9.9.6P1-0.25.1
SUSE Linux Enterprise Debuginfo 11-SP4 (src):    bind-9.9.6P1-0.25.1
SUSE Linux Enterprise Debuginfo 11-SP3 (src):    bind-9.9.6P1-0.25.1
SUSE Linux Enterprise Debuginfo 11-SP2 (src):    bind-9.9.6P1-0.25.1
Comment 16 Swamp Workflow Management 2016-03-19 11:12:22 UTC
openSUSE-SU-2016:0827-1: An update that fixes two vulnerabilities is now available.

Category: security (important)
Bug References: 970072,970073
CVE References: CVE-2016-1285,CVE-2016-1286
Sources used:
openSUSE 13.1 (src):    bind-9.9.4P2-2.29.1
Comment 17 Swamp Workflow Management 2016-03-19 11:13:48 UTC
openSUSE-SU-2016:0830-1: An update that fixes two vulnerabilities is now available.

Category: security (important)
Bug References: 970072,970073
CVE References: CVE-2016-1285,CVE-2016-1286
Sources used:
openSUSE Evergreen 11.4 (src):    bind-9.9.4P2-75.1
Comment 18 Swamp Workflow Management 2016-03-19 15:12:49 UTC
openSUSE-SU-2016:0834-1: An update that fixes two vulnerabilities is now available.

Category: security (important)
Bug References: 970072,970073
CVE References: CVE-2016-1285,CVE-2016-1286
Sources used:
openSUSE 13.2 (src):    bind-9.9.6P1-2.19.1
Comment 19 Marcus Meissner 2016-03-22 08:18:52 UTC
released
Comment 20 Swamp Workflow Management 2016-03-23 02:08:31 UTC
openSUSE-SU-2016:0859-1: An update that fixes two vulnerabilities is now available.

Category: security (important)
Bug References: 970072,970073
CVE References: CVE-2016-1285,CVE-2016-1286
Sources used:
openSUSE Leap 42.1 (src):    bind-9.9.6P1-33.1
Comment 24 Reinhard Max 2016-03-29 13:36:06 UTC
OK, closing again.
Comment 25 Haral Tsitsivas 2016-05-03 18:56:01 UTC
Requesting patch for SLES11SP1 LTSS.
Comment 26 Ahmad Sadeghpour 2016-05-03 19:00:29 UTC
(In reply to Haral Tsitsivas from comment #25)
> Requesting patch for SLES11SP1 LTSS.

Haral,
please a new Bugzilla for this request and refer to this one.
Comment 27 Swamp Workflow Management 2016-06-10 13:08:12 UTC
SUSE-SU-2016:1541-1: An update that fixes two vulnerabilities is now available.

Category: security (important)
Bug References: 970072,970073
CVE References: CVE-2016-1285,CVE-2016-1286
Sources used:
SUSE OpenStack Cloud 5 (src):    bind-9.9.6P1-0.27.1
SUSE Manager Proxy 2.1 (src):    bind-9.9.6P1-0.27.1
SUSE Manager 2.1 (src):    bind-9.9.6P1-0.27.1