Re: Strange Bind 9 crash (lenny, squeeze)

2011-05-27 Thread mail...@securitylabs.it

On 26/05/2011 22:53, Jan Ingvoldstad wrote:

Hi.

At $workplace, two of our internal, caching DNS servers, running Bind
9 experienced crashes in quick order today.



Hello, may be it has something related to this?

***
*Summary:* A BIND 9 DNS server set up to be a caching resolver is
vulnerable to a user querying a domain with very large resource record
sets (RRSets) when trying to negatively cache a response. This can
cause the BIND 9 DNS server (named process) to crash.

*Document ID:* CVE-2011-1910

*Document Status:* Draft

*Posting date:* 26 May 2011

*Program Impacted:* BIND

*Versions affected:* 9.4-ESV-R3 and later, 9.6-ESV-R2 and later,
9.6.3, 9.7.1 and later, 9.8.0 and later

*Severity:* High

*Exploitable:* Remotely

*CVSS Score:* Base 7.8

(AV:N/AC:L/Au:N/C:N/I:N/A:C)

For more information on the Common Vulnerability Scoring System and to
obtain your specific environmental score please visit:
http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2

*Description:*

DNS systems use negative caching to improve DNS response time. This
will keep a DNS resolver from repeatedly looking up domains that do
not exist. Any NXDOMAIN or NODATA/NOERROR response will be put into
the negative cache.

The authority data will be cached along with the negative cache
information. These authoritative ?Start of Authority? (SOA) and
NSEC/NSEC3 records prove the nonexistence of the requested name/type.
In DNSSEC, all of these records are signed; this adds one additional
RRSIG record, per DNSSEC key, for each record returned in the
authority section of the response.

In this vulnerability, very large RRSIG RRsets included in a negative
cache can trigger an assertion failure that will crash named (BIND 9
DNS) due to an off-by-one error in a buffer size check.

The nature of this vulnerability would allow remote exploit. An
attacker can set up an DNSSEC signed authoritative DNS server with a
large RRSIG RRsets to act as the trigger. The attacker would then find
ways to query an organization?s caching resolvers, using the negative
caches and the ?trigger? the vulnerability. The attacker would require
access to an organization?s caching resolvers. Access to the resolvers
can be direct (open resolvers), through malware (using a BOTNET to
query negative caches), or through driving DNS resolution (a SPAM run
that has a domain in the E-mail that will cause the client to do look
up a negative cache).

*Workarounds:* Restricting access to the DNS caching resolver
infrastructure will provide partial mitigation. Active exploitation
can be accomplished through malware or SPAM/Malvertizing actions that
will force authorized clients to look up domains that would trigger
this vulnerability.

*Solution:*

Upgrade to: 9.4-ESV-R4-P1, 9.6-ESV-R4-P1, 9.7.3-P1 or 9.8.0-P2
ftp://ftp.isc.org/isc/bind9/9.8.0-P2
ftp://ftp.isc.org/isc/bind9/9.7.3-P1
ftp://ftp.isc.org/isc/bind9/9.6-ESV-R4-P1
BIND 9.4 is less vulnerable than other versions, and a patched version
will be available on May 27th at ftp://ftp.isc.org/isc/bind9/9.4-ESV-R4-P1

*Exploit Status:* High. This issue has caused un-intentional outages.

US CERT is tracking this issue with INC00152411.

***


--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Archive: http://lists.debian.org/4ddf5af3.7000...@securitylabs.it



Lenny -> Squeeze DomU network does not start

2010-10-06 Thread mail...@securitylabs.it
 Hello, I've upgraded my test machine (Debian lenny Xenized 2.6.26 with 
2 DomU lenny) fron lenny to squeeze.


No problem upgrading Dom0 and one of the two DomU. But with the other 
DomU I can't start at boot time the network.


The error is:

Checking root file system...fsck from util-linux-ng 2.17.2
/lib/init/rw/rootdev: clean, 97209/655360 files, 1034777/2621440 blocks
done.
[1.276744] EXT3 FS on xvda2, internal journal
hwclock.sh: Permission denied
Loading kernel modules...done.
Cleaning up ifupdown
Setting up networking
Activating lvm and md swap...done.
Checking file systems...fsck from util-linux-ng 2.17.2
done.
Mounting local filesystems...done.
Activating swapfile swap...done.
Cleaning up temporary files
Setting kernel variables ...done.
Configuring network interfaces...ifup: failed to open statefile 
/etc/network/run/ifstate: No such file or directory

failed.
Cleaning up temporary files
startpar: service(s) returned failure: hwclockfirst.sh hwclock.sh ... 
failed!

Running scripts in rcS.d/ took 1 seconds.

From console I can bring up network interfaces manually (ifconfig eth0 
ip netmask up etc...)


/etc/network/run/ifstate is a symbolic link to a tmpfs so I cannot 
simply solve creating the file. I suspect one pakage is not upgraded 
correctly or not installed.


Any advice?

Thanks




Re: Lenny -> Squeeze DomU network does not start

2010-10-06 Thread mail...@securitylabs.it

 On 06/10/2010 11:56, mail...@securitylabs.it wrote:
Hello, I've upgraded my test machine (Debian lenny Xenized 2.6.26 with 
2 DomU lenny) fron lenny to squeeze.


No problem upgrading Dom0 and one of the two DomU. But with the other 
DomU I can't start at boot time the network.


The error is:

Checking root file system...fsck from util-linux-ng 2.17.2
/lib/init/rw/rootdev: clean, 97209/655360 files, 1034777/2621440 blocks
done.
[1.276744] EXT3 FS on xvda2, internal journal
hwclock.sh: Permission denied
Loading kernel modules...done.
Cleaning up ifupdown
Setting up networking
Activating lvm and md swap...done.
Checking file systems...fsck from util-linux-ng 2.17.2
done.
Mounting local filesystems...done.
Activating swapfile swap...done.
Cleaning up temporary files
Setting kernel variables ...done.
Configuring network interfaces...ifup: failed to open statefile 
/etc/network/run/ifstate: No such file or directory

failed.


Found the solution: on the "good" DomU I don't have this line:

none/dev/shmtmpfs   defaults0   0

in /etc/fstab, so I've commented on the other and now it works.