Bug 48346 (CVE-2003-0914)

Summary: VUL-0: CVE-2003-0914: vulnerability in bind8
Product: [Novell Products] SUSE Security Incidents Reporter: Roman Drahtmueller <draht>
Component: IncidentsAssignee: Security Team bot <security-team>
Status: RESOLVED FIXED QA Contact: Security Team bot <security-team>
Severity: Critical    
Priority: P3 - Medium CC: qa-bugs, security-team
Version: unspecified   
Target Milestone: ---   
Hardware: All   
OS: Linux   
Whiteboard: CVE-2003-0914: CVSS v2 Base Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Found By: --- Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---
Attachments: cachenegative patch for bind8.

Description Roman Drahtmueller 2003-11-26 09:28:00 UTC
...the only information that we have right now.
I have requested more input from the CERT, but I don't have more hope yet.

Lars, if you are not the maintainer, then pdb goes nuts with missing servers
or something alike.

Please note all changes to the process in this bug. We can re-classify it at a
later point in time to SUSE LINUX bugs class if the information is public.
The current product "Security" keeps it invisible from all users other than
security-team@.

After you're done with the packages, please reassign the bug to
security-team@suse.de so that we can proceed.

I hope we can get this off the stage very soon.

R.

 From: CERT Coordination Center <cert@cert.org>
 To: SuSE Security Team <security@suse.de>
 Cc: CERT Coordination Center <cert@cert.org>
 Date: Tue, 25 Nov 2003 20:04:29 -0500
 Subject: [security@suse.de] Publication Date for VU#734644 - suse


Hello,

The ISC has informed us that BIND 8.3.7 and BIND 8.4.3 will be publicly
announced at approximately 6pm EST on Wednesday, November 26.  The
packages have already been announced to BIND Forum members and published
on the ISC FTP site at:

    ftp://ftp.isc.org/isc/bind/src/8.3.7/
    ftp://ftp.isc.org/isc/bind/src/8.4.3/

This date was selected by the ISC; the CERT/CC was informed of the choice
this evening.  Sites based in the United States should note the upcoming
Thanksgiving holiday.

The CERT/CC will publish Vulnerability Note VU#734644 regarding this
issue, which corresponds to CVE candidate CAN-2003-0914.  We intend to
publish this document after the ISC has issued its public announcement,
and may wait as late as Monday, December 1.  We encourage vendors to make
their announcements as soon as the ISC has made a public announcement.

If you have any questions or concerns, please e-mail us at <cert@cert.org>
or call our hotline at 412-268-7090.

Thanks,

Jeffrey

-----------------------------
Jeffrey P. Lanza
Internet Security Analyst
CERT Coordination Center
Comment 1 Roman Drahtmueller 2003-11-26 09:38:31 UTC
Adding qa@ to Cc:. Reminder: bug is non-public and must not be disclosed.
Just that you don't have to hack your way to the information. :-)

Bitte verscharrt euch aus diesem Bug, wenn ihr das unbändigbare Bedürfnis habt.
Thought it's wise to have you updated until there is a timeline.

Bindige Grüße,
Roman.
Comment 2 Roman Drahtmueller 2003-11-26 11:02:44 UTC
more information came from CERT (said thanks already):


From: CERT Coordination Center <cert@cert.org>
To: SuSE Security Team <security@suse.de>
Cc: CERT Coordination Center <cert@cert.org>
Date: Tue, 25 Nov 2003 21:58:14 -0500
Subject: Re: [security@suse.de] Publication Date for VU#734644 - suse


Roman,

Roman Drahtmueller <draht@suse.de> writes:

> I am sure that you agree that there is not much information that would
> help us any further down the road of roviding an update package for each
> of our products. Can you provide us with any patch or other detailed
> information on the issue? We'd be very grateful for it.

We don't have access to a patch for this vulnerability; the best we'd be
able to do is create a diff from the source that's on the ISC FTP site.
We've also not received any detailed technical description of the
vulnerability, but we do have something that might increase your
understanding of it...

I asked the ISC to tell us a bit more about where the vulnerability was,
and they provided the following example:

    You can demonstrate the fault in a cache by querying a server
    configured like the following for attack-www-uu-net.example.net.

    zone "example.net" {
         type master;
         file "example.db";
    };
    zone "uu.net" {             // zone under attack
         type master;
         file "empty.db";
    };

    example.db contains:
    $TTL 7200
    @       SOA     . . 1 3600 1200 840000 7200
    @       NS      <name of hosting server>.
    attack-www-uu-net CNAME www.uu.net.

    empty.db: (Just SOA and NS records)
    $TTL 7200
    @   SOA     . . 1 3600 1200 840000 7200
    @   NS      <name of hosting server>.

With this example and a bit of research on negative responses, I came up
with the following description of the vulnerability, which I'll be using
in our public document:

    Several versions of the BIND 8 name server are vulnerable to cache
    poisoning via negative responses.  To exploit this vulnerability, an
    attacker must configure a name server to return authoritative negative
    responses for a given target domain.  Then, the attacker must convince
    a victim user to query the attacker's maliciously configured name
    server.  When the attacker's name server receives the query, it will
    reply with an authoritative negative response containing a large TTL
    (time-to-live) value.  If the victim's site runs a vulnerable version
    of BIND 8, it will cache the negative response and render the target
    domain unreachable until the TTL expires.

Given the immediate need for vendors to understand this vulnerability and
prepare an appropriate response, if you find this information useful, you
may pass it along to your colleagues on vendor-sec.

If you have any other questions, please feel free to ask.

Thanks,

Jeffrey

-----------------------------
Jeffrey P. Lanza
Internet Security Analyst
CERT Coordination Center
Comment 3 Roman Drahtmueller 2003-11-26 11:04:04 UTC
The vulnerability type (network DoS) justifies to hurry up with the issue.
No patches yet.
Comment 4 Roman Drahtmueller 2003-11-26 22:01:19 UTC
patch attachment added: from Ryan W. Maple <ryan@guardiandigital.com> via 
vendor-sec.
Comment 5 Roman Drahtmueller 2003-11-26 22:02:00 UTC
Created attachment 15402 [details]
cachenegative patch for bind8.
Comment 6 Lars Müller 2003-11-26 22:06:06 UTC
I've written Mark Andrews <marka@isc.org> by encrypted PM.

Jeffrey talks in comment #0 and #2 only about BIND 8 and the patch is also BIND
8 only.

I'm working on packages now.
Comment 7 Lars Müller 2003-11-26 22:53:50 UTC
Patch adapted to all BINd 8 version for SL 7.3 - 8.2; 9.0 doesn't include BIND 8.

I'll copy all versions after mbuild finished.
Comment 8 Roman Drahtmueller 2003-11-26 22:57:41 UTC
brilliant. Rudi says that all of the hilberts will be online soon so that
building can start.
Do we know for sure that the issue affects bind8 only and not bind9?

I am writing the patchinfo files (box and BP) now.

Thanks!
Comment 9 Lars Müller 2003-11-27 00:05:34 UTC
The BIND 9 source is completly different. I didn't find the ns_resp() function
as from bin/named/ns_resp.c nor the relevant place where the new variable
cachenegative is used. IMHO BIND 9 is ok.

I'll test the BIND 8 package only on SLES 8 and add a short report.

Comment 10 Lars Müller 2003-11-27 03:59:44 UTC
I've additionally checked the BIND 9.2.3 release notes. There's no message like
'Security Fix: Negative Cache Poison Fix.' from the file
ftp://ftp.isc.org/isc/bind/src/8.4.3/8.4.3-REL or '1581. [bug]    apply
anti-cache poison techniques to negative answers.' from the CHANGES file of the
tar ball.

The bug was originally fixed with release 8.4.2, Thu Sep  4 06:58:22 PDT 2003.
Comment 11 Lars Müller 2003-11-28 19:34:01 UTC
Remove BIND 9 from summary. All SUSE versions fixed.
Comment 12 Thomas Biege 2003-11-28 19:36:06 UTC
Since EnGarde Linux and Immunix OS announced new bind8 versions I approved our 
packages too. 
Comment 13 Roman Drahtmueller 2003-11-28 19:38:12 UTC
opening the bug scope to a broader audience.
Comment 14 Thomas Biege 2009-10-13 19:42:08 UTC
CVE-2003-0914: CVSS v2 Base Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)