patches for easier mirroring, to eliminate a special copy, to make www.freebsd.org/security a full copy of security.freebsd.org and be eventually be the same. For now files are just sitting there. The symlinks are missing. Discussed on: www (repository location) Discussed with: simon (so)
		
			
				
	
	
		
			104 lines
		
	
	
	
		
			3.8 KiB
		
	
	
	
		
			Text
		
	
	
	
	
	
			
		
		
	
	
			104 lines
		
	
	
	
		
			3.8 KiB
		
	
	
	
		
			Text
		
	
	
	
	
	
-----BEGIN PGP SIGNED MESSAGE-----
 | 
						|
 | 
						|
=============================================================================
 | 
						|
FreeBSD-SA-01:10                                           Security Advisory
 | 
						|
                                                                FreeBSD, Inc.
 | 
						|
 | 
						|
Topic:          bind remote denial of service
 | 
						|
 | 
						|
Category:       core, ports
 | 
						|
Module:         bind
 | 
						|
Announced:      2001-01-23
 | 
						|
Credits:	Fabio Pietrosanti <fabio@TELEMAIL.IT>
 | 
						|
Affects:        FreeBSD 3.x prior to the correction date.
 | 
						|
		Ports collection prior to the correction date.
 | 
						|
Corrected:      2000-11-27 (FreeBSD 3.5-STABLE)
 | 
						|
		2001-01-05 (Ports collection)
 | 
						|
Vendor status:  Updated version released
 | 
						|
FreeBSD only:   NO
 | 
						|
 | 
						|
I.   Background
 | 
						|
 | 
						|
bind is an implementation of the Domain Name System (DNS) protocols.
 | 
						|
 | 
						|
II.  Problem Description
 | 
						|
 | 
						|
A vulnerability exists with the bind nameserver dealing with
 | 
						|
compressed zone transfers.  Due to a problem with the compressed zone
 | 
						|
transfer (ZXFR) implementation, if named is configured for zone
 | 
						|
transfers and recursive resolving, it will crash after a ZXFR for the
 | 
						|
authoritative zone and a query of a remote hostname.  Since named is
 | 
						|
not configured under a watchdog process which will automatically
 | 
						|
restart it after a failure, this will lead to the denial of DNS
 | 
						|
service on the server.
 | 
						|
 | 
						|
All versions of FreeBSD 3.x prior to the correction date including
 | 
						|
3.5.1-RELEASE are vulnerable to this problem.  In addition, the bind8
 | 
						|
port in the ports collection is also vulnerable.  FreeBSD 4.x is not
 | 
						|
affected since it contains versions of BIND 8.2.3.
 | 
						|
 | 
						|
III. Impact
 | 
						|
 | 
						|
Malicious remote users can cause the named daemon to crash, if it is
 | 
						|
configured to allow zone transfers and recursive queries.
 | 
						|
 | 
						|
IV.  Workaround
 | 
						|
 | 
						|
A partial workaround can be implemented by disallowing zone transfers
 | 
						|
except from trusted hosts. Note that if the trusted hosts are
 | 
						|
compromised or contain malicious users, name servers with this bug
 | 
						|
will be vulnerable to the denial of service attack.
 | 
						|
 | 
						|
V.   Solution
 | 
						|
 | 
						|
[Base system]
 | 
						|
 | 
						|
Upgrade your vulnerable FreeBSD system to 3.5.1-STABLE after the
 | 
						|
correction date.
 | 
						|
 | 
						|
[Ports collection]
 | 
						|
 | 
						|
If you have chosen to install BIND from the ports collection and are
 | 
						|
using it instead of the version in the base system, perform one of the
 | 
						|
following steps:
 | 
						|
 | 
						|
1) Upgrade your entire ports collection and rebuild the bind8 port.
 | 
						|
 | 
						|
2) Deinstall the old package and install a new package dated after the
 | 
						|
correction date, obtained from:
 | 
						|
 | 
						|
[i386]
 | 
						|
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-3-stable/net/bind-8.2.2p7.tgz
 | 
						|
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-4-stable/net/bind-8.2.2p7.tgz
 | 
						|
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-5-current/net/bind-8.2.2p7.tgz
 | 
						|
 | 
						|
[alpha]
 | 
						|
Packages are not automatically generated for the alpha architecture at
 | 
						|
this time due to lack of build resources.
 | 
						|
 | 
						|
3) download a new port skeleton for the bind8 port from:
 | 
						|
 | 
						|
http://www.freebsd.org/ports/
 | 
						|
 | 
						|
and use it to rebuild the port.
 | 
						|
 | 
						|
4) Use the portcheckout utility to automate option (3) above. The
 | 
						|
portcheckout port is available in /usr/ports/devel/portcheckout or the
 | 
						|
package can be obtained from:
 | 
						|
 | 
						|
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-3-stable/devel/portcheckout-2.0.tgz
 | 
						|
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-4-stable/devel/portcheckout-2.0.tgz
 | 
						|
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/alpha/packages-4-stable/devel/portcheckout-2.0.tgz
 | 
						|
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-5-current/devel/portcheckout-2.0.tgz
 | 
						|
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/alpha/packages-5-current/devel/portcheckout-2.0.tgz
 | 
						|
 | 
						|
-----BEGIN PGP SIGNATURE-----
 | 
						|
Version: GnuPG v1.0.4 (FreeBSD)
 | 
						|
Comment: For info see http://www.gnupg.org
 | 
						|
 | 
						|
iQCVAwUBOm320lUuHi5z0oilAQHFXAP+NVSPyykl5nfZlsU/ocqyMAAt/ArNz1F/
 | 
						|
4GEL8Q5GF2+hhEOG4PoKfDiwQ/CK8gQT8kn46YI8k7J6kyDES3g15zQTPX0E2lJa
 | 
						|
dK0kpL4iWcLndZRHgFmE80//qY2E8G/pVIvhNi4yzjcFVTpshdSdl4OMcMf9IaYE
 | 
						|
zrWZ3Eyvdns=
 | 
						|
=PmSi
 | 
						|
-----END PGP SIGNATURE-----
 |