[3.6] bind: An error processing RPZ rules can cause named to loop endlessly after handling a query (CVE-2017-3140)
If named is configured to use Response Policy Zones (RPZ) an error
processing some rule types can lead to
a condition where BIND will endlessly loop while handling a query.
A server is potentially vulnerable to degradation of service if
- the server is configured to use RPZ,
- the server uses NSDNAME or NSIP policy rules, and
- an attacker can cause the server to process a specific query
Successful exploitation of this condition will cause named to enter a
state where it continues to loop while processing the query without ever
reaching an end state.
While in this state, named repeatedly queries the same sets of authoritative nameservers and this behavior will usually persist indefinitely beyond the normal client
query processing timeout. By triggering this condition multiple times, an attacker could cause a deliberate and substantial degradation in service.
Operators of servers that meet the above conditions 1. and 2. may also accidentally encounter this defect during normal operation. It is for this reason that the decision
was made to issue this advisory despite its low CVSS score.
9.9.10, 9.10.5, 9.11.0->9.11.1, 9.9.10-S1, 9.10.5-S1
BIND 9 version 9.11.1-P1
(from redmine: issue id 7438, created on 2017-06-16, closed on 2017-06-29)
- parent #7436 (closed)
- Revision dab03646 by Natanael Copa on 2017-06-16T14:17:12Z:
main/bind: security upgrade to 9.11.1_p1 (CVE-2017-3140) fixes #7438