trigger point for new bug

Michael McNally mcnally at isc.org
Wed Nov 16 21:20:17 UTC 2011


On 11/16/11 9:55 AM, Chris Brookes wrote:
> Any info on whether the newly announced bug can be triggered before
> the query ACL is applied on a recursive only server? An authoritative
> only server ought to be safe?

According to our best current understanding of the issue:

+  Authoritative-only nameservers should be safe and only
    recursing servers at risk.

+  From the security advisory we have posted on our website:
    ( http://www.isc.org/software/bind/advisories/cve-2011-4313 )
    "An as-yet unidentified network event caused BIND 9 resolvers
    to cache an invalid record, subsequent queries for which could
    crash the resolvers with an assertion failure."

    Your server has to be servicing a query for the invalid cache
    data to pull the trigger on this.  That comes after the query
    ACL is applied.

Although that's somewhat better than "anyone, anywhere, can cause
this to happen to any server at any time", you should not rely on
it, as it requires little imagination to think how a user in your
network might be enticed into an action which caused them to issue
a query for the malformed data.

Mitigation patches have been posted to the ISC web site which can
prevent the server from exiting when the invalid cache data is
encountered.  We strongly advise anyone running a recursing BIND 9
server to deploy them.

Michael McNally
ISC Support



More information about the bind-users mailing list