Bug ID | 987873 |
---|---|
Summary | VUL-0: CVE-2016-6173: nsd: malicious primary DNS servers can crash secondaries |
Classification | openSUSE |
Product | openSUSE.org |
Version | unspecified |
Hardware | Other |
OS | All |
Status | NEW |
Severity | Major |
Priority | P5 - None |
Component | 3rd party software |
Assignee | mrueckert@suse.com |
Reporter | astieger@suse.com |
QA Contact | opensuse-communityscreening@forge.provo.novell.com |
CC | mrueckert@suse.com |
Found By | Security Response Team |
Blocker | --- |
Courtesy bug from the SUSE security team for server:dns/nsd via oss-sec http://seclists.org/oss-sec/2016/q3/19 "most DNS server implementations do not implement reasonable restrictions for zone sizes. This allows an explicitly configured primary DNS server for a zone to crash a secondary DNS server, affecting service of other zones hosted on the same secondary server." from https://lists.dns-oarc.net/pipermail/dns-operations/2016-July/015058.html > * [ For [LT] Secondary DNS Service ] > > See https://github.com/sischkg/xfer-limit > > Most of authoritative DNS server softwares do not have size limit of > zone transfer. He generated unlimited zone information at master > server, and transfered to slave servers. BIND 9, knot DNS and Power > DNS slave servers received unlimited zone informataion and died. > NSD slave DNS server received unlimited zone data and /tmp became full. > > He generated zone transfer size limit patch for BIND 9, Knot, NSD, > PowerDNS. Third party patches at https://github.com/sischkg/xfer-limit References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-6173 http://seclists.org/oss-sec/2016/q3/20