Gentoo Archives: gentoo-announce

From: Robert Buchholz <rbu@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200809-02 ] dnsmasq: Denial of Service and DNS spoofing
Date: Thu, 04 Sep 2008 19:58:22
Message-Id: 200809042128.36310.rbu@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200809-02
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: dnsmasq: Denial of Service and DNS spoofing
9 Date: September 04, 2008
10 Bugs: #231282, #232523
11 ID: 200809-02
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Two vulnerabilities in dnsmasq might allow for a Denial of Service or
19 spoofing of DNS replies.
20
21 Background
22 ==========
23
24 Dnsmasq is a lightweight and easily-configurable DNS forwarder and DHCP
25 server.
26
27 Affected packages
28 =================
29
30 -------------------------------------------------------------------
31 Package / Vulnerable / Unaffected
32 -------------------------------------------------------------------
33 1 net-dns/dnsmasq < 2.45 >= 2.45
34
35 Description
36 ===========
37
38 * Dan Kaminsky of IOActive reported that dnsmasq does not randomize
39 UDP source ports when forwarding DNS queries to a recursing DNS
40 server (CVE-2008-1447).
41
42 * Carlos Carvalho reported that dnsmasq in the 2.43 version does not
43 properly handle clients sending inform or renewal queries for unknown
44 DHCP leases, leading to a crash (CVE-2008-3350).
45
46 Impact
47 ======
48
49 A remote attacker could send spoofed DNS response traffic to dnsmasq,
50 possibly involving generating queries via multiple vectors, and spoof
51 DNS replies, which could e.g. lead to the redirection of web or mail
52 traffic to malicious sites. Furthermore, an attacker could generate
53 invalid DHCP traffic and cause a Denial of Service.
54
55 Workaround
56 ==========
57
58 There is no known workaround at this time.
59
60 Resolution
61 ==========
62
63 All dnsmasq users should upgrade to the latest version:
64
65 # emerge --sync
66 # emerge --ask --oneshot --verbose ">=net-dns/dnsmasq-2.45"
67
68 References
69 ==========
70
71 [ 1 ] CVE-2008-3350
72 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3350
73 [ 2 ] CVE-2008-1447
74 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447
75
76 Availability
77 ============
78
79 This GLSA and any updates to it are available for viewing at
80 the Gentoo Security Website:
81
82 http://security.gentoo.org/glsa/glsa-200809-02.xml
83
84 Concerns?
85 =========
86
87 Security is a primary focus of Gentoo Linux and ensuring the
88 confidentiality and security of our users machines is of utmost
89 importance to us. Any security concerns should be addressed to
90 security@g.o or alternatively, you may file a bug at
91 http://bugs.gentoo.org.
92
93 License
94 =======
95
96 Copyright 2008 Gentoo Foundation, Inc; referenced text
97 belongs to its owner(s).
98
99 The contents of this document are licensed under the
100 Creative Commons - Attribution / Share Alike license.
101
102 http://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature