The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


FreeBSD Security Advisory: FreeBSD-SA-01:18.bind


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: Wed, 31 Jan 2001 13:23:21 -0800
From: FreeBSD Security Advisories <security-advisories@FreeBSD.org.>
To: [email protected]
Subject: FreeBSD Security Advisory: FreeBSD-SA-01:18.bind

-----BEGIN PGP SIGNED MESSAGE-----


FreeBSD-SA-01:18 Security Advisory FreeBSD, Inc. Topic: BIND remotely exploitable buffer overflow Category: core, ports Module: bind Announced: 2001-01-31 Credits: COVERT Labs <seclabs@NAI.COM.> Claudio Musmarra Affects: All released versions of FreeBSD 3.x, 4.x. FreeBSD 3.5-STABLE prior to the correction date. FreeBSD 4.2-STABLE prior to the correction date. Ports collection prior to the correction date. Corrected: 2001-01-30 (FreeBSD 3.5-STABLE) 2001-01-29 (FreeBSD 4.2-STABLE) 2001-01-29 (Ports collection) Vendor status: Updated version released FreeBSD only: NO I. Background BIND is an implementation of the Domain Name Service (DNS) protocols. II. Problem Description An overflowable buffer related to the processing of transaction signatures (TSIG) exists in all versions of BIND prior to 8.2.3-RELEASE. The vulnerability is exploitable regardless of configuration options and affects both recursive and non-recursive DNS servers. Additional vulnerabilities allow the leaking of environment variables and the contents of the program stack. These vulnerabilities may assist the ability of attackers to exploit the primary vulnerability described above, and make provide additional information about the state or configuration of the system. All previous versions of BIND 8, such as the beta versions included in FreeBSD 4.x prior to the correction date (designated the version number BIND 8.2.3-T<#>B) are vulnerable to this problem. Systems running versions of BIND 9.x (available in the FreeBSD ports collection) are unaffected. Further information about the vulnerabilities is contained in the CERT advisory located at: http://www.cert.org/advisories/CA-2001-02.html Note that this advisory also describes vulnerabilities in the BIND 4.x software, which is not included in any recent version of FreeBSD. All versions of FreeBSD 3.x and 4.x prior to the correction date including 3.5.1-RELEASE and 4.2-RELEASE are vulnerable to this problem, if they have been configued to run named (this is not enabled by default). In addition, the bind8 port in the ports collection (versions prior to 8.2.3) is also vulnerable. To check whether a DNS server is running a vulnerable version of BIND, perform the following command as any user: % dig @serverip version.bind. CHAOS TXT The following segment of output indicates a non-vulnerable server running BIND 8.2.3-RELEASE: ... ;; ANSWER SECTION: VERSION.BIND. 0S CHAOS TXT "8.2.3-REL" ... III. Impact Malicious remote users can cause arbitrary code to be executed as the user running the named daemon. This is often the root user, although FreeBSD provides built-in support for the execution of named as an unprivileged 'bind' user, which greatly limits the scope of the vulnerability should a successful penetration take place. IV. Workaround There is no known practical workaround to prevent the vulnerability from being exploited, short of upgrading the software. A partial workaround to limit the impact of the vulnerability should it be exploited is to run named as an unprivileged user. Add the following line to /etc/rc.conf: named_flags="-u bind -g bind" # Flags for named Add the following line to your /etc/namedb/named.conf file, in the "options" section: pid-file "/var/named/named.pid"; See the named.conf(5) manual page for more details about configuring named. Perform the following commands as root: Create a directory writable by the bind user where named can store its pid file: # mkdir /var/named # chown bind:bind /var/named Shut down the DNS server: # ndc stop Restart it using the non-privileged user and group: # ndc -p /var/named/named.pid start -u bind -g bind Note that when not running as the root user, named will lose the ability to re-bind to interfaces which change address, or which are added to the system after named has been started. If such an event takes place, named will need to be stopped and restarted in order to re-bind to the interface(s). See the ndc(8) manual page for more information about how to do this. Use of the -t option to named will also increase security when run as a non-privileged user by confining the named process to a chroot environment and thereby partially limiting the access it has to the rest of the system. Configuration of these options is beyond the scope of the advisory. The following website contains information which may be useful to administrators wishing to perform this step: http://www.losurs.org/docs/howto/Chroot-BIND.html Note that this tutorial does not specifically relate to FreeBSD, and the information contained therein may need to be modified for FreeBSD systems. Note that such a penetration of the unprivileged bind user may still allow the attacker to take advantage of a local security vulnerability or misconfiguration to further increase privileges. Therefore this should only be considered a temporary workaround while preparations can be made to upgrade permanently. It is recommended that all affected users upgrade their systems immediately as described in the following section. V. Solution Note that BIND 8.2.3-RELEASE is more strict about invalid zone file syntax than older versions. DNS zones which contain errors may need to be corrected before the new version can be run. [Base system] Upgrade your vulnerable FreeBSD system to 3.5-STABLE or 4.2-STABLE after the respective correction dates. A binary tarball containing the updated BIND files may be released in a few days, but is being held back for quality assurance reasons. In the meantime an unofficial tarball is available from the following location. Users are advised that the following tarball has not been tested on a production system, and those wishing to perform an upgrade without upgrading the entire OS are advised to use the bind8 port as described below. http://www.freebsd.org/~kris/bind-8.2.3-4.x.tgz http://www.freebsd.org/~kris/bind-8.2.3-4.x.tgz.asc To fetch and install it, perform the following actions as root: # fetch http://www.freebsd.org/~kris/bind-8.2.3-4.x.tgz # fetch http://www.freebsd.org/~kris/bind-8.2.3-4.x.tgz.asc Verify the detached PGP signature using your PGP utility. # cd / # tar xvfz /path/to/bind-8.2.3-4.x.tgz Stop and restart the named process as shown: # ndc restart See the note in the previous section about how to restart ndc as a non-privileged user if it has been configued to run that way. [Ports collection] If you have chosen to install BIND from the ports collection and are using it instead of the version in the base system, perform one of the following steps: 1) Update your entire ports collection and rebuild the bind8 port. If you are installing the port for the first time, be sure to edit the named_program variable in /etc/rc.conf to point to the installed location of the named executable. The bind8 port can be configured to install itself in /usr and read configuration data from /etc so that it is drop-in compatible with the system version of BIND. Install the port as follows: # cd /usr/ports/net/bind8 # make PREFIX=/usr PIDDIR=/var/run DESTETC=/etc/namedb \ DESTRUN=/var/run all install clean If you install the BIND port over the top of the system version in this way, be sure to add the following line to /etc/make.conf to prevent the future rebuilding of the system version during 'make world': NO_BIND= true # do not build BIND 2) Deinstall the old package and install a new package dated after the correction date, obtained from: [i386] ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-3-stable/net/bind-8.2.3.tgz ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-4-stable/net/bind-8.2.3.tgz ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-5-current/net/bind-8.2.3.tgz NOTE: It may be several days before updated packages are available. [alpha] Packages are not automatically generated for the alpha architecture at this time due to lack of build resources. 3) download a new port skeleton for the bind8 port from: http://www.freebsd.org/ports/ and use it to rebuild the port. 4) Use the portcheckout utility to automate option (3) above. The portcheckout port is available in /usr/ports/devel/portcheckout or the package can be obtained from: ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-3-stable/devel/portcheckout-2.0.tgz ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-4-stable/devel/portcheckout-2.0.tgz ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/alpha/packages-4-stable/devel/portcheckout-2.0.tgz ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-5-current/devel/portcheckout-2.0.tgz ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/alpha/packages-5-current/devel/portcheckout-2.0.tgz -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.4 (FreeBSD) Comment: For info see http://www.gnupg.org iQCVAwUBOniArlUuHi5z0oilAQGE+AQAiwizuORMqyzOw21QFyap2Z7lv7BkYuiC 9zZ97X3WR+i8AujTfIrhwK1UdO6KFbp5Rjc54f3XHtaMotoRcp3x24xADpGQDP4s Xyw267ZoV7ZYuG6VcAgBzq9pqiCnU9rqRQy2aRn/8iCvcl/G5249B3DuMMtLiMw+ Iuz0OOxWeLM= =hanM -----END PGP SIGNATURE-----

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру