lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20021008052619.3F2257B9@starfruit.itojun.org>
From: security-officer at netbsd.org (NetBSD Security Officer)
Subject: NetBSD Security Advisory 2002-015: (another) buffer overrun in libc/libresolv DNS resolver

-----BEGIN PGP SIGNED MESSAGE-----


		 NetBSD Security Advisory 2002-015
		 =================================

Topic:		(another) buffer overrun in libc/libresolv DNS resolver

Version:	NetBSD-current:	source prior to August 28, 2002
		NetBSD-1.6 beta: source prior to August 28, 2002
		NetBSD-1.5.3:	affected
		NetBSD-1.5.2:	affected
		NetBSD-1.5.1:	affected
		NetBSD-1.5:	affected
		NetBSD-1.4.*:	affected
		All prior NetBSD releases.
		pkgsrc:		net/bind4, prior to bind-4.9.10
				net/bind8, prior to bind-8.2.5
				emulators/compat14 prior to 1.4.3.2
				emulators/compat14-crypto prior to 1.4.3.2
				emulators/netbsd32_compat14 prior to 1.4.3.2
				emulators/compat15 prior to 1.5.3.1
					if ships with libc/libresolv shlib
				emulators/netbsd32_compat15 prior to 1.5.3.1
				emulators/* for other operating systems,
					if ships with libc/libresolv shlib
				any statically linked pkgsrc binaries
				(there could be more)
				programs that call res_* directly with small
				receive buffer

Severity:	remote buffer overrun on any application that uses DNS,
		possible remote root exploit (not confirmed)

Fixed:		NetBSD-current:		August 28, 2002
		NetBSD-1.6 branch:	August 28, 2002	(1.6 includes the fix)
		NetBSD-1.5 branch:	September 5, 2002
		pkgsrc:			net/bind4 4.9.10
					net/bind8 8.3.3
					emulators/compat14 1.4.3.2
					emulators/compat14-crypto 1.4.3.2
					emulators/netbsd32_compat14 1.4.3.2
					emulators/compat15 1.5.3.1
					emulators/netbsd32_compat15 1.5.3.1
					emulators/* for other operating systems
						- not yet

Abstract
========

BIND-based DNS resolver did not allocate a sufficiently large receive
memory buffer.  Large DNS responses (even if valid) could overrun the
buffer, or could confuse DNS response parsing.

NetBSD uses BIND4-based DNS resolver code in libc/libresolv, and is
vulnerable.

The release of this advisory has been postponed for coordination with
third party.


Technical Details
=================

http://www.kb.cert.org/vuls/id/738331


Solutions and Workarounds
=========================

The recent NetBSD 1.6 release is not vulnerable to this issue. A full
upgrade to NetBSD 1.6 is the recommended resolution for all users able
to do so. Many security-related improvements have been made, and
indeed this release has been delayed several times in order to include
fixes for a number of recent issues.

Note that any statically-linked binary that makes any DNS query is
vulnerable, and cannot be fixed by replacing a shared library.
Therefore, updating the entire system is suggested.

Note also that shared libraries from other operating systems installed
for binary compatibility under /emul may also be vulnerable. Please
consult the vendor of those libraries for further details.

If you have NetBSD systems that have been upgraded from earlier
releases from before 1997, you may have libc and/or libresolv shared
libraries with older shared library major numbers.  Check for the
presence of /usr/lib/libc.so.X.Y where X < 12 (the current major
number).  These old libraries contain vulnerable resolver code, and
will not be updated even if you rebuild the system; they are retained
for support of old programs linked against them.  Therefore, we
suggest you replace any such binaries and remove the old shared
libraries.


* NetBSD-current:

	Systems running NetBSD-current dated from before 2002-08-28
	should be upgraded to NetBSD-current dated 2002-08-28 or later.

	The following directories need to be updated from the
	netbsd-current CVS branch (aka HEAD):
		lib/libc/net
	Also note that the include files needs to be in sync with
	code in lib/libc/net.

	To update from CVS, re-build, and re-install libc and statically linked
	binaries:
		# cd src
		# cvs update -d -P lib/libc/net

		# cd lib/libc
		# make cleandir dependall
		# make install

		# cd ../..
		# make dependall
		# make install


* NetBSD 1.6 betas:

	Systems running NetBSD 1.6 BETAs and Release Candidates should
	be upgraded to the NetBSD 1.6 release.

	If a source-based point upgrade is required, sources from the
	NetBSD 1.6 branch dated 2002-08-28 or later should be used.

	The following directories need to be updated from the
	netbsd-1-6 CVS branch:
		lib/libc/net
	Also note that the include files needs to be in sync with
	code in lib/libc/net.

	To update from CVS, re-build, and re-install libc and statically linked
	binaries:
		# cd src
		# cvs update -d -P -r netbsd-1-6 lib/libc/net

		# cd lib/libc
		# make cleandir dependall
		# make install

		# cd ../..
		# make dependall
		# make install


* NetBSD 1.5.x:

	Systems running NetBSD 1.5 dated from before 2002-09-05
	should be upgraded to NetBSD 1.5 tree dated 2002-09-05 or later.

	The following directories need to be updated from the
	netbsd-1-5 CVS branch:
		lib/libc/net
	Also note that the include files needs to be in sync with
	code in lib/libc/net.

	To update from CVS, re-build, and re-install libc and statically linked
	binaries:
		# cd src
		# cvs update -d -P -r netbsd-1-5 lib/libc/net

		# cd lib/libc
		# make cleandir dependall
		# make install

		# cd ../..
		# make dependall
		# make install


* NetBSD 1.4.x:

	NetBSD 1.4.x has reached end-of-life.  Users should upgrade to 1.5.x
	or 1.6.


* pkgsrc:

	BIND4:
	bind-4.9.9 (pkgsrc/net/bind4) and prior are vulnerable.  Upgrade to
	bind-4.9.10.  Note that BIND4 nameserver is considered obsolete by
	the vendor (ISC), and it is recommended to use BIND9, or BIND8.

	BIND8:
	pkgsrc prior to bind-8.2.5 are vulnerable.  Upgrade to bind-8.3.3
	(BIND8 prior to 8.3.3 is vulnerable to other problems).

	static binaries:
	If you have statically linked binaries in pkgsrc, they have to be
	rebuilt.  Statically linked binaries can be identified by the
	following command (note: be sure to include the directory you install
	pkgsrc binaries to, if you've changed LOCALBASE from the default of
	/usr/pkg)

		file /usr/pkg/{bin,sbin,libexec}/* | grep static

	compat14, compat14-crypto, netbsd32_compat14, compat15,
	netbsd32_compat15 (emulators category):
	They may contain libc/libresolv shared libraries which might be
	vulnerable.  See top of this advisory for revision numbers.

	emulation libraries:
	Shared libraries for binary compatibility are available
	through pkgsrc for some operating systems, and are installed into
	/emul.  Some of them may be vulnerable as noted above if installed.


Thanks To
=========

Jun-ichiro itojun Hagino for patches, and initial advisory text.

The NetBSD Release Engineering teams, for great patience and
assistance in dealing with repeated security issues discovered
recently.


Revision History
================

	2002-10-08	Initial release


More Information
================

Advisories may be updated as new information comes to hand.  The most
recent version of this advisory (PGP signed) can be found at 
  ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-015.txt.asc

Information about NetBSD and NetBSD security can be found at
http://www.NetBSD.ORG/ and http://www.NetBSD.ORG/Security/.


Copyright 2002, The NetBSD Foundation, Inc.  All Rights Reserved.

$NetBSD: NetBSD-SA2002-015.txt,v 1.15 2002/10/08 03:43:35 itojun Exp $


-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv

iQCVAwUBPaJUTz5Ru2/4N2IFAQEz5QP/cc2KrgSaqae+cuWEdBw3TceLk3KhScCh
HMBc86dFkR1RyaRlJuMyOKgh3QV+NIzCI8RrWfO2wt0Zgjg6A8sDpwRC/WadqVYb
ElMJtGyNMhuf66VDdouInI+sKmvRN8Hs6wdK78MRAZJhvTafHenXD6jbYLFQzSze
bcRrblz/Jr8=
=At7u
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ