Original release date: June 04, 2002<br>
Last revised: Wed Sep 18 10:40:08 EDT 2002<br>
Source: CERT/CC<br>

<p>A complete revision history can be found at the end of this file.</p>

<br>
<a name="affected"></a>
<h3>Systems Affected</h3>

<ul>
<li>Domain Name System (DNS) servers running ISC BIND 9 prior to
9.2.1

<p>
Because the normal operation of most services on the Internet depends
on the proper operation of DNS servers, other services could be
affected if this vulnerability is exploited.
</p>
</li>
</ul>

<a name="overview"></a>
<h2>Overview</h2>

A denial-of-service vulnerability exists in version 9 of the Internet
Software Consortium's (<A HREF="http://www.isc.org/">ISC</A>) Berkeley
Internet Name Domain (BIND) server. ISC BIND versions 8 and 4 are not
affected. Exploiting this vulnerability will cause the BIND server to
shut down.
</p>

<a name="description"></a> <h2>I. Description</h2>

BIND is an implementation of the Domain Name System (DNS) that is
maintained by the ISC. A vulnerability exists in version 9 of BIND
that allows remote attackers to shut down BIND servers. An attacker
can cause the shutdown by sending a specific DNS packet designed to
trigger an internal consistency check. However, this vulnerability
will not allow an attacker to execute arbitrary code or write data to
arbitrary locations in memory.

<p>
The internal consistency check that triggers the shutdown occurs when
the rdataset parameter to the <i>dns_message_findtype()</i> function
in <font face="monospace"/>message.c</font> is not NULL as
expected. The condition causes the code to assert an error message and
call <i>abort()</i> to shut down the BIND server.  It is also possible
to accidentally trigger this vulnerability using common queries found
in routine operation, especially queries originating from SMTP
servers.
</p>

<p>A vulnerability note describing this problem can be found at <a
href="http://www.kb.cert.org/vuls/id/739123">http://www.kb.cert.org/vuls/id/739123</a>. This
vulnerability note includes a list of vendors that have been contacted
about this vulnerability.</p>

<p>This vulnerability is also being referenced as <a
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0400">CAN-2002-0400</a>:

<blockquote>
<a
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0400">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0400</a>
</blockquote>

<a name="impact"></a>
<h2>II. Impact</h2>

<p>Exploitation of this vulnerability will cause the BIND server to
abort and shut down. As a result, the BIND server will not be
available unless it is restarted.</p>

<a name="solution"></a>
<h2>III. Solution</h2>

<h4>Apply a patch from your vendor</h4>

<p>The ISC has released BIND version 9.2.1. The CERT/CC recommends
that users of BIND 9 apply a patch from their vendor or upgrade to <a
href="http://www.isc.org/products/BIND/bind9.html">BIND 9.2.1</a>.</p>

<a name="vendors"></a>
<h2>Appendix A. - Vendor Information</h2>

<p>This appendix contains information provided by vendors for this
advisory.  As vendors report new information to the CERT/CC, we will
update this section and note the changes in our revision history.  If a
particular vendor is not listed below, we have not received their
comments.</p>



<!-- begin vendor -->
<a name="alcatel">
<h4><a href="http://www.alcatel.com">Alcatel</a></h4>
<blockquote>
<p>
In relation to this CERT advisory on security vulnerabilities with ISC
BIND 9 implementation, Alcatel has conducted an immediate assessment
to determine any impact this may have on our portfolio. An initial
analysis has shown that none of our products is affected when used as
delivered to customers. The security of our customers' networks is of
highest priority for Alcatel. Therefore, investigations are going on,
in particular for the UMTS GPRS Core Network portfolio, to determine
any impact. Updates will be provided if necessary. Customers may
contact their Alcatel support representative for more details.
</p>
</blockquote>
</p>
<!-- end vendor -->


<!-- begin vendor -->
<a name="apple">
<h4><a href="http://www.apple.com">Apple</a></h4>
<blockquote>
<p>
The version of BIND that ships in Mac OS X and Mac OS X Server does
not contain this vulnerability.
</p>
</blockquote>
</p>
<!-- end vendor -->

<!-- begin vendor -->
<a name="bsdi">
<h4><a href="http://www.bsdi.com">BSDI</a></h4>
<blockquote>
<p>
Wind River Systems, Inc. does not include BIND 9 with any version of
BSD/OS.
</p>
</blockquote>
</p>
<!-- end vendor -->


<!-- begin vendor -->
<a name="caldera">
<h4><a href="http://www.caldera.com">Caldera</a></h4>
<blockquote>
<p>
SCO OpenServer from Caldera does not ship BIND9, and is therefore not vulnerable.<br><br>

Caldera Open UNIX does ship BIND9, and is vulnerable. We are investigating.<br><br>

Caldera OpenLinux does not ship BIND9, and is therefore not vulnerable.
</p>
</blockquote>
</p>
<!-- end vendor -->

<!-- begin vendor -->
<a name="compaq">
<h4><a href="http://www.compaq.com">Compaq Computer Corporation</a></h4>
<blockquote>
<p>
HP Alpha Server Products:<br>
<br>
HP Tru64 UNIX:<br>
Tru64 UNIX is not vulnerable to this reported problem. HP Tru64 UNIX ships
with BIND 8.2.2-p5<br>
<br>
TCP/IP for HP OpenVms:<br>
TCP/IP for HP OpenVms is not vulnerable to this reported problem.The current
versions of TCP/IP for HP OpenVMS ship BIND 8.2.2-p5<br>
<br>
HP NonStop Server:<br>
"HP NonStop Himalaya is not vulnerable to this problem.&nbsp; The 'named'
function of Domain Name Server (T6021) which is implemented for HP NonStop
Himalaya is based on BIND 4.8.&nbsp; NonStop DNS is the only Himalaya software
product that includes 'named'."
</p>
</blockquote>
</p>
<!-- end vendor -->


<!-- begin vendor -->
<a name="cray">
<h4><a href="http://www.cray.com">Cray</a></h4>
<blockquote>
<p>
Cray, Inc. is not vulnerable since the BIND distributed with Unicos
and Unicos/mk is not based on BIND 9.
</p>
</blockquote>
</p>
<!-- end vendor -->

<!-- begin vendor -->
<a name="djbdns">
<h4><a href="http://cr.yp.to/djbdns.html">djbdns</a></h4>
<blockquote>
<p>
djbdns does not have this bug. Unlike BIND 9, djbdns does not
commit<br> hara-kiri when an attacker tries to confuse it, or pokes it
sharply, or<br> simply thinks bad thoughts in its general
direction. djbdns has never<br> used any BIND-derived code. See <a
href="http://cr.yp.to/djbdns.html">http://cr.yp.to/djbdns.html</a> .
</p>
</blockquote>
</p>
<!-- end vendor -->


<!-- begin vendor -->
<a name="engarde">
<h4><a href="http://www.guardiandigital.com">Engarde</a></h4>
<blockquote>
<p>
Guardian Digital does not ship BIND 9 in any versions of EnGarde
Secure Linux, therefore we are not vulnerable.  All versions were
shipped with BIND 8.
</p>
</blockquote>
</p>
<!-- end vendor -->

<!-- begin vendor -->
<a name="f5">
<h4><a href="http://www.f5.com">F5 Networks, Inc.</a></h4>
<blockquote>
<p>
EDGE-FX contains a vulnerable version of BIND 9.&nbsp; Instructions for obtaining
and installing a patch are available at <a href="ftp://ftp.f5.com/Domestic/Edgefx/named_patch/cert_patch_6_2002.html">
ftp://ftp.f5.com/Domestic/Edgefx/named_patch/cert_patch_6_2002.html</a>.<br>
<br>
All other F5 Networks products contain BIND 8.2, and are therefore not affected
by this vulnerability.
</p>
</blockquote>
</p>
<!-- end vendor -->

<!-- begin vendor -->
<a name="freebsd">
<h4><a href="http://www.freebsd.org">FreeBSD</a></h4>
<blockquote>
<p>
The FreeBSD base system does not ship with ISC BIND 9.  However, ISC
BIND 9 is available in the FreeBSD Ports Collection.  It is currently
at version 9.2.1 and is therefore unaffected.
</p>
</blockquote>
</p>
<!-- end vendor -->

<!-- begin vendor -->
<a name="hp">
<h4><a href="http://www.hp.com">Hewlett-Packard Company</a></h4>
<blockquote>
<p>
HEWLETT-PACKARD COMPANY SECURITY BULLETIN: HPSBUX0207-202
<p>
Originally issued: 22 July 2002
<p>
HP Published Security Bulletin HPSBUX0207-202 with solutions for
HP9000 Series 700/800 running HP-UX release 11.11 (11i) only with the
BINDv920.INETSVCS-BIND fileset installed.
<p>
This bulletin is available from the HP IT Resource Center page at:
<a href="http://itrc.hp.com">http://itrc.hp.com</a> "Maintenance and Support" then "Support Information
Digests" and then "hp security bulletins archive" search for bulletin
HPSBUX0207-202.
</p>
</blockquote>
</p>
<!-- end vendor -->


<!-- begin vendor -->
<a name="ibm">
<h4><a href="http://www.ibm.com">IBM</a></h4>
<blockquote>
<p>
After analysis of the affected component, IBM has determined that the
AIX bind deamon is not vulnerable to the attack as described in the
CERT advisory.
</p>
</blockquote>
</p>
<!-- end vendor -->

<!-- begin vendor -->
<a name="inktomi">
<h4><a href="http://www.inktomi.com">Inktomi Corporation</a></h4>
<blockquote>
<p>
Inktomi Inktomi Traffic Server DNS proxy does not include BIND9 and is
therefore not vulnerable.
</p>
</blockquote>
</p>
<!-- end vendor -->



<!-- begin vendor -->
<a name="isc">
<h4><a href="http://www.isc.org">Internet Software Consortium</a></h4>
<blockquote>
<p>
This vulnerability was found through routine bug analysis. BIND 9 is
designed to exit when it detects an internal consistency error to
reduce the impact of bugs in the server. ISC strongly reccomends that
all BIND 9 users upgrade immediately to 9.2.1. BIND 9.2.1 can be found
at <a
href="http://www.isc.org/products/BIND/bind9.html">http://www.isc.org/products/BIND/bind9.html</a>.
</p>
</blockquote>
</p>
<!-- end vendor -->


<!-- begin vendor -->
<a name="mandrakesoft">
<h4><a href="http://www.mandrakesoft.com/">MandrakeSoft</a></h4>
<blockquote>
<p>
Mandrake Linux 8.x ships with BIND9 and as such updated packages will
be available as early as possible.
</p>
</blockquote>
</p>
<!-- end vendor -->


<!-- begin vendor -->
<a name="microsoft">
<h4><a href="http://www.microsoft.com/">Microsoft Corporation</a></h4>
<blockquote>
<p>
Microsoft has reviewed the information and can confirm that our
products are not affected by this vulnerability.
</p>
</blockquote>
</p>
<!-- end vendor -->

<!-- begin vendor -->
<a name="nec">
<h4><a href="http://www.nec.com/">NEC Corporation</a></h4>
<blockquote>
<p>
sent on June 3, 2002<br>
<br>
[Server Products]<br>
<br>
* EWS/UP 48 Series operating system<br>
&nbsp;&nbsp; - is NOT vulnerable.
</p>
</blockquote>
</p>
<!-- end vendor -->

<!-- begin vendor -->
<a name="netbsd">
<h4><a href="http://www.netbsd.org/">NetBSD</a></h4>
<blockquote>
<p>
NetBSD has not included Bind 9 in the base system of any release or
-current development branch.<br><br> Bind 9 is available from the 3rd
party software system, pkgsrc. Users who have installed net/bind9 or
net/bind9-current should update to a fixed
version. pkgsrc/security/audit-packages can be used to keep up to date
with these types of issues.
</p>
</blockquote>
</p>
<!-- end vendor -->



<!-- begin vendor -->
<a name="networkappliance">
<h4><a href="http://www.netapp.com/">Network Appliance</a></h4>
<blockquote>
<p>
All NetApp products do not contain any BIND code, so no NetApp product
is vulnerable to this problem.
</p>
</blockquote>
</p>
<!-- end vendor -->


<!-- begin vendor -->
<a name="nortelnetworks">
<h4><a href="http://www.nortelnetworks.com/">Nortel Networks Limited</a></h4>
<blockquote>
<p>
Nortel Networks is reviewing its portfolio to determine if any
products are affected by the vulnerability noted in CERT Advisory
CA-2002-15. A definitive statement will be issued shortly.
</p>
</blockquote>
</p>
<!-- end vendor -->




<!-- begin vendor -->
<a name="redhat">
<h4><a href="http://www.redhat.com/">Red Hat</a></h4>
<blockquote>
<p>
Red Hat distributed BIND 9 in Red Hat Linux versions 7.1, 7.2, and 7.3.
We are currently working on producing errata packages, when complete these
will be available along with our advisory at the URL below.&nbsp; At the
same time users of the Red Hat Network will be able to update their systems
using the 'up2date' tool.<br>
<br>
<a href="http://rhn.redhat.com/errata/RHSA-2002-105.html"> http://rhn.redhat.com/errata/RHSA-2002-105.html</a>
</p>
</blockquote>
</p>
<!-- end vendor -->

<!-- begin vendor -->
<a name="sgi">
<h4><a href="http://www.sgi.com/">Silicon Graphics, Inc.</a></h4>
<blockquote>
<p>
IRIX does not ship with BIND9 and is not vulnerable.
</p>
</blockquote>
</p>
<!-- end vendor -->

<!-- begin vendor -->
<a name="sun">
<h4><a href="http://www.sun.com/">Sun Microsystems</a></h4>
<blockquote>
<p>
Sun does not ship BIND 9 with any version of Solaris at this time and
is therefore not affected by this issue.
</p>
</blockquote>
</p>
<!-- end vendor -->

<!-- begin vendor -->
<a name="suse">
<h4><a href="http://www.suse.com/">SuSE, Inc.</a></h4>
<blockquote>
<p>
We are affected by the bind9 DoS issue as well. All of our currently
supported SuSE Linux products come with a bind9 package. We will
release an announcement for the issue, coordinated with your timeframe
and not before we see your official announcement.
</p>
</blockquote>
</p>
<!-- end vendor -->

<!-- begin vendor -->
<a name="unisphere">
<h4><a href="http://www.unispherenetworks.com/">Unisphere Networks, Inc.</a></h4>
<blockquote>
<p>
The Unisphere Networks ERX family of edge routers does not implement a
DNS server or named daemon within the Unison OS.  Additionally, the
DNS client found on the ERX is not based on the ISC BIND
code. Unisphere Networks has no reason to expect a similar problem
exists in the DNS client implementation found on the ERX.
</p>
</blockquote>
</p>
<!-- end vendor -->

<hr noshade>

<p>The CERT Coordination Center thanks the Internet Software
Consortium for notifying us about this vulnerability.</p>

<p></p>
<hr noshade>

<p>Author: <a
href="mailto:cert@cert.org?subject=CA-2002-15%20Feedback%20VU%23739123">Ian
A. Finlay</a>

<p></p>

<!--#include virtual="/include/footer_nocopyright.html" -->

<p>Copyright 2002 Carnegie Mellon University.</p>

<p>Revision History
<pre>
June 04, 2002: Initial release
June 11, 2002: Added vendor statement for djbdns
June 11, 2002: Added vendor statement for Inktomi Corporation
June 11, 2002: Updated vendor statement for F5 Networks, Inc.
Aug  08, 2002: Added vendor statement for Hewlett Packard
Sep  18, 2002: Added vendor statement for Alcatel
</pre>
</p>