Bug 1104129 - (CVE-2018-5740) VUL-1: CVE-2018-5740: bind: A flaw in the "deny-answer-aliases" feature can cause an INSIST assertion failure in named
(CVE-2018-5740)
VUL-1: CVE-2018-5740: bind: A flaw in the "deny-answer-aliases" feature can c...
Status: RESOLVED FIXED
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P3 - Medium : Normal
: ---
Assigned To: Security Team bot
Security Team bot
https://smash.suse.de/issue/212451/
CVSSv3:SUSE:CVE-2018-5740:7.5:(AV:N/A...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2018-08-08 05:42 UTC by Marcus Meissner
Modified: 2022-09-16 13:25 UTC (History)
6 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments
Fix for CVE-2018-5740. (1.77 KB, patch)
2019-04-17 09:30 UTC, Alexander Bergmann
Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Comment 2 Marcus Meissner 2018-08-09 05:33:54 UTC
actually is public

https://kb.isc.org/article/AA-01639/0/CVE-2018-5740%3A-A-flaw-in-the-deny-answer-aliases-feature-can-cause-an-INSIST-assertion-failure-in-named.html

CVE-2018-5740: A flaw in the "deny-answer-aliases" feature can cause an INSIST assertion failure in named
Author: Michael McNally Reference Number: AA-01639 Views: 2716 Created: 2018-08-08 16:00 Last Updated: 2018-08-08 20:27 	0 Rating/ Voters 	

A rarely-used feature in BIND has a flaw which can cause named to exit with an INSIST assertion failure.
CVE:
CVE-2018-5740
Document Version: 
2.0
Posting date: 
08 August 2018
Program Impacted: 
BIND
Versions affected: 
9.7.0->9.8.8, 9.9.0->9.9.13, 9.10.0->9.10.8, 9.11.0->9.11.4, 9.12.0->9.12.2, 9.13.0->9.13.2
Severity: 
High (but only for servers on which the "deny-answer-aliases" feature is explicitly enabled)
Exploitable: 
Remotely

Description:

"deny-answer-aliases" is a little-used feature intended to help recursive server operators protect end users against DNS rebinding attacks, a potential method of circumventing the security model used by client browsers.  However, a defect in this feature makes it easy, when the feature is in use, to experience an INSIST assertion failure in name.c. 

Impact:

Accidental or deliberate triggering of this defect will cause an INSIST assertion failure in named, causing the named process to stop execution and resulting in denial of service to clients.  Only servers which have explicitly enabled the "deny-answer-aliases" feature are at risk and disabling the feature prevents exploitation.

CVSS Score:  7.5

CVSS Vector:  CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

For more information on the Common Vulnerability Scoring System and to obtain your specific environmental score please visit: https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Workarounds:

This vulnerability can be avoided by disabling the "deny-answer-aliases" feature if it is in use.

Active exploits:

No known active exploits.

Solution:

Most operators will not need to make any changes unless they are using the "deny-answer-aliases" feature (which is described in the BIND 9 Adminstrator Reference Manual section 6.2.)  "deny-answer-aliases" is off by default; only configurations which explicitly enable it can be affected by this defect.

If you are using "deny-answer-aliases", upgrade to the patched release most closely related to your current version of BIND.

    9.9.13-P1
    9.10.8-P1
    9.11.4-P1
    9.12.2-P1

BIND Supported Preview Edition is a special feature preview branch of BIND provided to eligible ISC support customers.

    9.11.3-S3

Acknowledgements:

ISC would like to thank Tony Finch of the University of Cambridge for reporting this issue.

Document Revision History:

1.0 Advance Notification 31 July, 2018
2.0 Public Disclosure 08 August, 2018
Comment 4 Navin Kukreja 2018-09-05 10:29:50 UTC
There is no patch available for this. The only fix is to upgrade to latest release. 

Moreover, it is applicable only when 'deny-answer-aliases' feature is enabled which in our packages is disabled by default.
Comment 5 Johannes Segitz 2018-10-09 11:13:17 UTC
(In reply to Navin Kukreja from comment #4)
can you backport the upstream fix?

Setting to VUL-1 because it's disabled in the default config
Comment 6 Alexander Bergmann 2019-04-17 09:28:53 UTC
I've tracked down the fix and have a patch available to this issue.

Upstream commit:
https://gitlab.isc.org/isc-projects/bind9/merge_requests/607/commits

References:
https://bugzilla.redhat.com/show_bug.cgi?id=1613595
Comment 7 Alexander Bergmann 2019-04-17 09:30:08 UTC
Created attachment 803108 [details]
Fix for CVE-2018-5740.
Comment 8 Alexander Bergmann 2019-04-17 09:32:40 UTC
Navin, could you please submit for SLE-11-SP2?
Comment 11 Reinhard Max 2019-05-29 09:45:32 UTC
Not needed for SLE-10-SP3 and SLE-11, because they do not contian the
vulnerable feature. All others are done.
Comment 13 Swamp Workflow Management 2019-06-03 19:11:39 UTC
SUSE-SU-2019:1407-1: An update that fixes four vulnerabilities is now available.

Category: security (important)
Bug References: 1104129,1126068,1126069,1133185
CVE References: CVE-2018-5740,CVE-2018-5743,CVE-2018-5745,CVE-2019-6465
Sources used:
SUSE Linux Enterprise Module for Server Applications 15-SP1 (src):    bind-9.11.2-12.11.2
SUSE Linux Enterprise Module for Server Applications 15 (src):    bind-9.11.2-12.11.2
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1 (src):    bind-9.11.2-12.11.2
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 (src):    bind-9.11.2-12.11.2
SUSE Linux Enterprise Module for Basesystem 15-SP1 (src):    bind-9.11.2-12.11.2
SUSE Linux Enterprise Module for Basesystem 15 (src):    bind-9.11.2-12.11.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 14 Swamp Workflow Management 2019-06-06 22:14:52 UTC
SUSE-SU-2019:14074-1: An update that fixes four vulnerabilities is now available.

Category: security (important)
Bug References: 1104129,1126068,1126069,1133185
CVE References: CVE-2018-5740,CVE-2018-5743,CVE-2018-5745,CVE-2019-6465
Sources used:
SUSE Linux Enterprise Server 11-SP4-LTSS (src):    bind-9.9.6P1-0.51.15.4
SUSE Linux Enterprise Point of Sale 11-SP3 (src):    bind-9.9.6P1-0.51.15.4
SUSE Linux Enterprise Debuginfo 11-SP4 (src):    bind-9.9.6P1-0.51.15.4
SUSE Linux Enterprise Debuginfo 11-SP3 (src):    bind-9.9.6P1-0.51.15.4

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 15 Swamp Workflow Management 2019-06-07 16:11:50 UTC
SUSE-SU-2019:1449-1: An update that fixes four vulnerabilities is now available.

Category: security (important)
Bug References: 1104129,1126068,1126069,1133185
CVE References: CVE-2018-5740,CVE-2018-5743,CVE-2018-5745,CVE-2019-6465
Sources used:
SUSE Linux Enterprise Server 12-LTSS (src):    bind-9.9.9P1-28.42.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 16 Swamp Workflow Management 2019-06-10 13:11:40 UTC
openSUSE-SU-2019:1532-1: An update that fixes four vulnerabilities is now available.

Category: security (important)
Bug References: 1104129,1126068,1126069,1133185
CVE References: CVE-2018-5740,CVE-2018-5743,CVE-2018-5745,CVE-2019-6465
Sources used:
openSUSE Leap 42.3 (src):    bind-9.9.9P1-56.1
Comment 17 Swamp Workflow Management 2019-06-10 13:12:37 UTC
openSUSE-SU-2019:1533-1: An update that fixes four vulnerabilities is now available.

Category: security (important)
Bug References: 1104129,1126068,1126069,1133185
CVE References: CVE-2018-5740,CVE-2018-5743,CVE-2018-5745,CVE-2019-6465
Sources used:
openSUSE Leap 15.1 (src):    bind-9.11.2-lp151.11.3.1
openSUSE Leap 15.0 (src):    bind-9.11.2-lp150.8.13.1
Comment 18 Swamp Workflow Management 2019-06-11 13:10:50 UTC
SUSE-SU-2019:1406-2: An update that fixes four vulnerabilities is now available.

Category: security (important)
Bug References: 1104129,1126068,1126069,1133185
CVE References: CVE-2018-5740,CVE-2018-5743,CVE-2018-5745,CVE-2019-6465
Sources used:
SUSE CaaS Platform 3.0 (src):    bind-9.9.9P1-63.12.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 20 Craig Hai 2019-09-03 18:13:15 UTC
When can we expect a patch for SUSE Linux Enterprise Server 12 SP4. It's been "In progress" for quite some time.

Thanks,
Craig
Comment 22 Swamp Workflow Management 2019-10-01 16:20:31 UTC
SUSE-SU-2019:2502-1: An update that solves 5 vulnerabilities and has three fixes is now available.

Category: security (important)
Bug References: 1104129,1118367,1118368,1126068,1126069,1128220,1133185,1138687
CVE References: CVE-2018-5740,CVE-2018-5743,CVE-2018-5745,CVE-2019-6465,CVE-2019-6471
Sources used:
SUSE Linux Enterprise Software Development Kit 12-SP4 (src):    bind-9.11.2-3.10.1
SUSE Linux Enterprise Server 12-SP4 (src):    bind-9.11.2-3.10.1
SUSE Linux Enterprise Desktop 12-SP4 (src):    bind-9.11.2-3.10.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 23 Carlos López 2022-09-16 13:25:22 UTC
Done, closing.