SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   BIND Vendors:   ISC (Internet Software Consortium)
BIND DNS Query Port Entropy Weakness Lets Remote Users Spoof the System
SecurityTracker Alert ID:  1020438
SecurityTracker URL:  http://securitytracker.com/id/1020438
CVE Reference:   CVE-2008-1447   (Links to External Site)
Updated:  Jul 24 2008
Original Entry Date:  Jul 8 2008
Impact:   Modification of system information
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): 9.x
Description:   A vulnerability was reported in BIND. A remote user can spoof the system.

The domain name system (DNS) service does not use sufficiently random UDP sockets to process queries. A remote user can send specially crafted DNS queries and responses to the target service to spoof responses and insert records into the DNS cache. This may cause traffic to be redirected to arbitrary IP addresses specified by the remote user.

The vendor indicates that the vulnerability exists in the DNS protocol itself, rather than in any particular vendor's implementation.

Systems using BIND as a caching resolver are affected.

Some demonstration exploit code is available at:

http://www.caughq.org/exploits/CAU-EX-2008-0002.txt
http://www.caughq.org/exploits/CAU-EX-2008-0003.txt

Dan Kaminsky of IOActive reported this vulnerability.

Impact:   A remote user can spoof the DNS service, causing traffic to be redirected to arbitrary hosts.
Solution:   The vendor has issued patches (9.5.0-P1, 9.4.2-P1, 9.3.5-P1). New beta releases (9.5.1b1, 9.4.3b2) are also available.

The software is available at:

http://www.isc.org/index.pl?/menu.pl?sect=sw

The vendor reports that the fix provides increased resilience to the attack, but that "DNSSEC is the only full solution."

Vendor URL:  www.isc.org/index.pl?/sw/bind/index.php (Links to External Site)
Cause:   Randomization error
Underlying OS:   Linux (Any), UNIX (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Jul 8 2008 (Red Hat Issues Fix) BIND DNS Query Port Entropy Weakness Lets Remote Users Spoof the System
Red Hat has issued a fix for Red Hat Enterprise Linux 2.1, 3, 4, and 5.
Jul 9 2008 (Sun Issues Fix) BIND DNS Query Port Entropy Weakness Lets Remote Users Spoof the System
Sun has issued a fix for Solaris 8, 9, 10 and for OpenSolaris.
Jul 14 2008 (FreeBSD Issues Fix) BIND DNS Query Port Entropy Weakness Lets Remote Users Spoof the System   (FreeBSD Security Advisories <security-advisories@freebsd.org>)
FreeBSD has released a fix for FreeBSD 6.3 and 7.0.
Jul 14 2008 (Novell NetWare is Affected) BIND DNS Query Port Entropy Weakness Lets Remote Users Spoof the System
Novell is working on a fix for Novell NetWare.
Jul 17 2008 (HP Issues Fix for HP-UX) BIND DNS Query Port Entropy Weakness Lets Remote Users Spoof the System
HP has issued a fix for HP-UX 11.11, 11.23, and 11.31.
Jul 18 2008 (IBM Issues Fix for AIX) BIND DNS Query Port Entropy Weakness Lets Remote Users Spoof the System
IBM has issued a fix for IBM AIX 5.2, 5.3, 6.1.
Jul 24 2008 (OpenBSD Issues Fix) BIND DNS Query Port Entropy Weakness Lets Remote Users Spoof the System
OpenBSD has issued a fix for OpenBSD 4.2 and 4.3.
Jul 25 2008 (NetBSD Issues Fix) BIND DNS Query Port Entropy Weakness Lets Remote Users Spoof the System   (NetBSD Security-Officer <security-officer@NetBSD.org>)
NetBSD has released a fix for NetBSD 3.0, 3.1, and 4.0.
Aug 1 2008 (Apple Issues Fix) BIND DNS Query Port Entropy Weakness Lets Remote Users Spoof the System
Apple has issued a fix for Mac OS X 10.4.11 and 10.5.4.
Aug 4 2008 (IBM Issues Fix) BIND DNS Query Port Entropy Weakness Lets Remote Users Spoof the System
IBM has issued a fix for AIX 5.2, 5.3, and 6.1.
Aug 13 2008 (HP Issues Fix for Tru64) BIND DNS Query Port Entropy Weakness Lets Remote Users Spoof the System
HP has issued Early Release Patch kits for HP Tru64 UNIX.
Aug 14 2008 (HP Issues Fix for OpenVMS) BIND DNS Query Port Entropy Weakness Lets Remote Users Spoof the System
HP has issued Early Release Patches for OpenVMS.
Jan 29 2009 (HP Issues Advisory for MPE/iX) BIND DNS Query Port Entropy Weakness Lets Remote Users Spoof the System
HP has issued an advisory for MPE/iX.
Feb 3 2009 (HP Issues Fix for HP NonStop Server) BIND DNS Query Port Entropy Weakness Lets Remote Users Spoof the System
HP has issued a fix for HP NonStop Server.



 Source Message Contents

Date:  Tue, 8 Jul 2008 13:27:06 -0400
Subject:  BIND


DNS cache poisoning

CVE-2008-1447

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC