Stories
Slash Boxes
Comments

SoylentNews is people

posted by janrinok on Thursday July 30 2015, @02:08PM   Printer-friendly
from the patch-now dept.

https://www.isc.org/blogs/about-cve-2015-5477-an-error-in-handling-tkey-queries-can-cause-named-to-exit-with-a-require-assertion-failure/

As the security incident manager for this particular vulnerability notification, I'd like to say a little extra, beyond our official vulnerability disclosure about this critical defect in BIND [Wikipedia].

Many of our bugs are limited in scope or affect only users having a particular set of configuration choices. CVE-2015-5477 does not fall into that category. Almost all unpatched BIND servers are potentially vulnerable. We know of no configuration workarounds. Screening the offending packets with firewalls is likely to be difficult or impossible unless those devices understand DNS at a protocol level and may be problematic even then. And the fix for this defect is very localized to one specific area of the BIND code.

The practical effect of this is that this bug is difficult to defend against (except by patching, which is completely effective) and will not be particularly difficult to reverse-engineer. I have already been told by one expert that they have successfully reverse-engineered an attack kit from what has been divulged and from analyzing the code changes, and while I have complete confidence that the individual who told me this is not intending to use his kit in a malicious manner, there are others who will do so who may not be far behind. Please take steps to patch or download a secure version immediately.

This bug is designated "Critical" and it deserves that designation.

The existence of this bug was announced 'in-house' on 28 July but is announced publicly today. Apologies for releasing my own story [submission].


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by zeigerpuppy on Thursday July 30 2015, @09:38PM

    by zeigerpuppy (1298) on Thursday July 30 2015, @09:38PM (#216033)

    Djbdns is a nice alternative (dbndns on Debian servers).

    It has a nice readable format and has been rock solid for me.
    Here's some links as a primer if you're thinking of switching.
    (the grumpy badger guide is awesome)

    http://www.xmarks.com/s/site/www.lifewithdjbdns.com/ [xmarks.com]

    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2  
  • (Score: 0) by Anonymous Coward on Friday July 31 2015, @03:50AM

    by Anonymous Coward on Friday July 31 2015, @03:50AM (#216149)

    Used to use djb for recursive only (years ago). Today unbound is a better choice.

    For non-recursive, we have stuck with bind (most vulnerabilities in bind have been in the recursive bits).