On 11/16/11 9:55 AM, Chris Brookes wrote:
Any info on whether the newly announced bug can be triggered before
the query ACL is applied on a recursive only server? An authoritative
only server ought to be safe?

According to our best current understanding of the issue:

+  Authoritative-only nameservers should be safe and only
   recursing servers at risk.

+  From the security advisory we have posted on our website:
   ( http://www.isc.org/software/bind/advisories/cve-2011-4313 )
   "An as-yet unidentified network event caused BIND 9 resolvers
   to cache an invalid record, subsequent queries for which could
   crash the resolvers with an assertion failure."

   Your server has to be servicing a query for the invalid cache
   data to pull the trigger on this.  That comes after the query
   ACL is applied.

Although that's somewhat better than "anyone, anywhere, can cause
this to happen to any server at any time", you should not rely on
it, as it requires little imagination to think how a user in your
network might be enticed into an action which caused them to issue
a query for the malformed data.

Mitigation patches have been posted to the ISC web site which can
prevent the server from exiting when the invalid cache data is
encountered.  We strongly advise anyone running a recursing BIND 9
server to deploy them.

Michael McNally
ISC Support
_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to