[Bug 246702] Re: [CVE-2008-1447] Randomize DNS query source ports to prevent cache poisoning

Marc Deslauriers marc.deslauriers at canonical.com
Thu Mar 26 16:59:41 UTC 2015


This is fixed in all currently-supported versions of Ubuntu.

** Changed in: glibc (Ubuntu)
       Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to glibc in Ubuntu.
https://bugs.launchpad.net/bugs/246702

Title:
  [CVE-2008-1447] Randomize DNS query source ports to prevent cache
  poisoning

Status in bind9 package in Ubuntu:
  Fix Released
Status in glibc package in Ubuntu:
  Fix Released

Bug description:
  Binary package hint: bind9

  Debian issued three security advisories related to the possibility of
  DNS cache poisoning in Bind 9 (DSA-1603), Bind 8 (DSA-1604) and the
  libc stub resolver (DSA-1605).

  Here is the description of the problem with Bind 9 from DSA-1603-1:

  "Dan Kaminsky discovered that properties inherent to the DNS protocol
  lead to practical DNS cache poisoning attacks.  Among other things,
  successful attacks can lead to misdirected web traffic and email
  rerouting.

  This update changes Debian's BIND 9 packages to implement the
  recommended countermeasure: UDP query source port randomization.  This
  change increases the size of the space from which an attacker has to
  guess values in a backwards-compatible fashion and makes successful
  attacks significantly more difficult."

  [...]

  "Other caching resolvers distributed by Debian (PowerDNS, MaraDNS,
  Unbound) already employ source port randomization, and no updated
  packages are needed.  BIND 9.5 up to and including version
  1:9.5.0.dfsg-4 only implements a weak form of source port
  randomization and needs to be updated as well.  For information on
  BIND 8, see DSA-1604-1, and for the status of the libc stub resolver,
  see DSA-1605-1."

  As described in DSA-1605-1, glibc stub resolver hasn't been updated
  yet and is still vulnerable. The advisory suggests to install a local
  Bind 9 resolver, possibly in forward-only mode, as a work-around. So
  this bug in package glibc is a request to make the stub resolver
  randomize source ports as well because non-technical Ubuntu users
  can't be expected to configure Bind 9 on their own.

  References

  DSA-1603-1:
  http://lists.debian.org/debian-security-announce/2008/msg00184.html
  http://www.debian.org/security/2008/dsa-1603

  DSA-1604-1:
  http://lists.debian.org/debian-security-announce/2008/msg00185.html
  http://www.debian.org/security/2008/dsa-1604

  DSA-1605-1:
  http://lists.debian.org/debian-security-announce/2008/msg00186.html
  http://www.debian.org/security/2008/dsa-1605

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/bind9/+bug/246702/+subscriptions



More information about the foundations-bugs mailing list