You can not select more than 25 topics
			Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
		
		
		
		
		
			
		
			
				
					
					
						
							58 lines
						
					
					
						
							2.6 KiB
						
					
					
				
			
		
		
	
	
							58 lines
						
					
					
						
							2.6 KiB
						
					
					
				| # --- SDE-COPYRIGHT-NOTE-BEGIN --- | |
| # This copyright note is auto-generated by ./scripts/Create-CopyPatch. | |
| # | |
| # Filename: package/.../djbdns/AXFR_vulnerability.patch | |
| # Copyright (C) 2009 The OpenSDE Project | |
| # | |
| # More information can be found in the files COPYING and README. | |
| # | |
| # This patch file is dual-licensed. It is available under the license the | |
| # patched project is licensed under, as long as it is an OpenSource license | |
| # as defined at http://www.opensource.org/ (e.g. BSD, X11) or under the terms | |
| # of the GNU General Public License as published by the Free Software | |
| # Foundation; either version 2 of the License, or (at your option) any later | |
| # version. | |
| # --- SDE-COPYRIGHT-NOTE-END --- | |
|  | |
| Mailing-List: contact [email protected]; run by ezmlm | |
| Date: 4 Mar 2009 01:34:21 -0000 | |
| Message-ID: <[email protected]> | |
| Mail-Followup-To: [email protected] | |
| Automatic-Legal-Notices: See http://cr.yp.to/mailcopyright.html. | |
| From: "D. J. Bernstein" <[email protected]> | |
| To: [email protected] | |
| Subject: djbdns<=1.05 lets AXFRed subdomains overwrite domains | |
|  | |
| If the administrator of example.com publishes the example.com DNS data | |
| through tinydns and axfrdns, and includes data for sub.example.com | |
| transferred from an untrusted third party, then that third party can | |
| control cache entries for example.com, not just sub.example.com. This is | |
| the result of a bug in djbdns pointed out by Matthew Dempsky. (In short, | |
| axfrdns compresses some outgoing DNS packets incorrectly.) | |
|  | |
| Even though this bug affects very few users, it is a violation of the | |
| expected security policy in a reasonable situation, so it is a security | |
| hole in djbdns. Third-party DNS service is discouraged in the djbdns | |
| documentation but is nevertheless supported. Dempsky is hereby awarded | |
| $1000. | |
|  | |
| The next release of djbdns will be backed by a new security guarantee. | |
| In the meantime, if any users are in the situation described above, | |
| those users are advised to apply Dempsky's patch and requested to accept | |
| my apologies. The patch is also recommended for other users; it corrects | |
| the bug without any side effects. A copy of the patch appears below. | |
|  | |
| ---D. J. Bernstein | |
|    Research Professor, Computer Science, University of Illinois at Chicago | |
|  | |
| --- ./response.c.orig	2009-03-05 22:16:18.000000000 +0200 | |
| +++ ./response.c	2009-03-05 22:16:57.000000000 +0200 | |
| @@ -34,7 +34,7 @@ | |
|          uint16_pack_big(buf,49152 + name_ptr[i]); | |
|          return response_addbytes(buf,2); | |
|        } | |
| -    if (dlen <= 128) | |
| +    if ((dlen <= 128) && (response_len < 16384)) | |
|        if (name_num < NAMES) { | |
|  	byte_copy(name[name_num],dlen,d); | |
|  	name_ptr[name_num] = response_len;
 | |
| 
 |