Gentoo Archives: gentoo-announce

From: Pierre-Yves Rofes <py@g.o>
To: gentoo-announce@l.g.o
Cc: full-disclosure@××××××××××××××.uk, bugtraq@×××××××××××××.com, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200812-19 ] PowerDNS: Multiple vulnerabilities
Date: Fri, 19 Dec 2008 21:44:14
Message-Id: 494C1569.3090600@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200812-19
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: PowerDNS: Multiple vulnerabilities
9 Date: December 19, 2008
10 Bugs: #234032, #247079
11 ID: 200812-19
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Two vulnerabilities have been discovered in PowerDNS, possibly leading
19 to a Denial of Service and easing cache poisoning attacks.
20
21 Background
22 ==========
23
24 The PowerDNS Nameserver is an authoritative-only nameserver which uses
25 a flexible backend architecture.
26
27 Affected packages
28 =================
29
30 -------------------------------------------------------------------
31 Package / Vulnerable / Unaffected
32 -------------------------------------------------------------------
33 1 net-dns/pdns < 2.9.21.2 >= 2.9.21.2
34
35 Description
36 ===========
37
38 Daniel Drown reported an error when receiving a HINFO CH query
39 (CVE-2008-5277). Brian J. Dowling of Simplicity Communications
40 discovered a previously unknown security implication of the PowerDNS
41 behavior to not respond to certain queries it considers malformed
42 (CVE-2008-3337).
43
44 Impact
45 ======
46
47 A remote attacker could send specially crafted queries to cause a
48 Denial of Service. The second vulnerability in itself does not pose a
49 security risk to PowerDNS Nameserver. However, not answering a query
50 for an invalid DNS record within a valid domain allows for a larger
51 spoofing window on third-party nameservers for domains being hosted by
52 PowerDNS Nameserver itself.
53
54 Workaround
55 ==========
56
57 There is no known workaround at this time.
58
59 Resolution
60 ==========
61
62 All PowerDNS users should upgrade to the latest version:
63
64 # emerge --sync
65 # emerge --ask --oneshot --verbose ">=net-dns/pdns-2.9.21.2"
66
67 References
68 ==========
69
70 [ 1 ] CVE-2008-3337
71 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3337
72 [ 2 ] CVE-2008-5277
73 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5277
74
75 Availability
76 ============
77
78 This GLSA and any updates to it are available for viewing at
79 the Gentoo Security Website:
80
81 http://security.gentoo.org/glsa/glsa-200812-19.xml
82
83 Concerns?
84 =========
85
86 Security is a primary focus of Gentoo Linux and ensuring the
87 confidentiality and security of our users machines is of utmost
88 importance to us. Any security concerns should be addressed to
89 security@g.o or alternatively, you may file a bug at
90 http://bugs.gentoo.org.
91
92 License
93 =======
94
95 Copyright 2008 Gentoo Foundation, Inc; referenced text
96 belongs to its owner(s).
97
98 The contents of this document are licensed under the
99 Creative Commons - Attribution / Share Alike license.
100
101 http://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature