Vulnerabilities > CVE-2019-6467 - Reachable Assertion vulnerability in ISC Bind

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
low complexity
isc
CWE-617
nessus

Summary

A programming error in the nxdomain-redirect feature can cause an assertion failure in query.c if the alternate namespace used by nxdomain-redirect is a descendant of a zone that is served locally. The most likely scenario where this might occur is if the server, in addition to performing NXDOMAIN redirection for recursive clients, is also serving a local copy of the root zone or using mirroring to provide the root zone, although other configurations are also possible. Versions affected: BIND 9.12.0-> 9.12.4, 9.14.0. Also affects all releases in the 9.13 development branch.

Common Weakness Enumeration (CWE)

Nessus

  • NASL familyDNS
    NASL idBIND9_CVE-2019-6467.NASL
    descriptionISC BIND versions 9.12.x prior to 9.12.4-P1, or 9.13.x prior to 9.14.1 are affected by a DoS vulnerability in the nxdomain-redirect feature in the query.c. An unauthenticated, remote attacker can exploit this issue, to cause the application to stop responding.
    last seen2020-05-23
    modified2019-05-03
    plugin id124588
    published2019-05-03
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/124588
    titleISC BIND 9.12.x < 9.12.4-P1, 9.13.x < 9.14.1 Denial of Service Vulnerability
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(124588);
      script_version("1.4");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/05/22");
    
      script_cve_id("CVE-2019-6467");
      script_bugtraq_id(108071);
      script_xref(name:"IAVA", value:"2019-A-0139-S");
    
      script_name(english:"ISC BIND 9.12.x < 9.12.4-P1, 9.13.x < 9.14.1 Denial of Service Vulnerability");
      script_summary(english:"Checks the version of ISC BIND.");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote name server is affected by a denial of service vulnerability.");
      script_set_attribute(attribute:"description", value:
    "ISC BIND versions 9.12.x prior to 9.12.4-P1, or 9.13.x prior to 9.14.1 are affected by a DoS vulnerability in the
    nxdomain-redirect feature in the query.c. An unauthenticated, remote attacker can exploit this issue, to cause the
    application to stop responding.");
      script_set_attribute(attribute:"see_also", value:"https://kb.isc.org/docs/aa-00861");
      script_set_attribute(attribute:"see_also", value:"https://kb.isc.org/docs/aa-00913");
      script_set_attribute(attribute:"see_also", value:"https://kb.isc.org/docs/cve-2019-6467");
      script_set_attribute(attribute:"solution", value:
    "Upgrade to ISC BIND version 9.12.4-P1, 9.14.1, or later.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-6467");
    
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2019/04/24");
      script_set_attribute(attribute:"patch_publication_date", value:"2019/04/24");
      script_set_attribute(attribute:"plugin_publication_date", value:"2019/05/03");
    
      script_set_attribute(attribute:"potential_vulnerability", value:"true");
      script_set_attribute(attribute:"plugin_type", value:"remote");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:isc:bind");
      script_set_attribute(attribute:"stig_severity", value:"I");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"DNS");
    
      script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("bind_version.nasl");
      script_require_keys("bind/version", "Settings/ParanoidReport");
    
      exit(0);
    }
    
    include("vcf.inc");
    include("vcf_extras.inc");
    
    vcf::bind::initialize();
    
    app_info = vcf::get_app_info(app:"BIND", port:53, kb_ver:"bind/version", service:TRUE, proto:"UDP");
    
    if (report_paranoia < 2) audit(AUDIT_PARANOID);
    
    constraints = [
      { "min_version" : "9.12.0", "fixed_version" : "9.12.4-P1" },
      { "min_version" : "9.13.0", "fixed_version" : "9.14.1" }
    ];
    constraints = vcf::bind::filter_constraints(constraints:constraints, version:app_info.version);
    
    vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_WARNING);
    
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2020-1355.NASL
    descriptionAccording to the versions of the bind packages installed, the EulerOS Virtualization for ARM 64 installation on the remote host is affected by the following vulnerabilities : - A programming error in the nxdomain-redirect feature can cause an assertion failure in query.c if the alternate namespace used by nxdomain-redirect is a descendant of a zone that is served locally. The most likely scenario where this might occur is if the server, in addition to performing NXDOMAIN redirection for recursive clients, is also serving a local copy of the root zone or using mirroring to provide the root zone, although other configurations are also possible. Versions affected: BIND 9.12.0-> 9.12.4, 9.14.0. Also affects all releases in the 9.13 development branch.(CVE-2019-6467) - With pipelining enabled each incoming query on a TCP connection requires a similar resource allocation to a query received via UDP or via TCP without pipelining enabled. A client using a TCP-pipelined connection to a server could consume more resources than the server has been provisioned to handle. When a TCP connection with a large number of pipelined queries is closed, the load on the server releasing these multiple resources can cause it to become unresponsive, even for queries that can be answered authoritatively or from cache. (This is most likely to be perceived as an intermittent server problem).(CVE-2019-6477) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-04-07
    modified2020-04-02
    plugin id135142
    published2020-04-02
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/135142
    titleEulerOS Virtualization for ARM 64 3.0.6.0 : bind (EulerOS-SA-2020-1355)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(135142);
      script_version("1.2");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/04/06");
    
      script_cve_id(
        "CVE-2019-6467",
        "CVE-2019-6477"
      );
    
      script_name(english:"EulerOS Virtualization for ARM 64 3.0.6.0 : bind (EulerOS-SA-2020-1355)");
      script_summary(english:"Checks the rpm output for the updated packages.");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote EulerOS Virtualization for ARM 64 host is missing multiple security
    updates.");
      script_set_attribute(attribute:"description", value:
    "According to the versions of the bind packages installed, the EulerOS
    Virtualization for ARM 64 installation on the remote host is affected
    by the following vulnerabilities :
    
      - A programming error in the nxdomain-redirect feature
        can cause an assertion failure in query.c if the
        alternate namespace used by nxdomain-redirect is a
        descendant of a zone that is served locally. The most
        likely scenario where this might occur is if the
        server, in addition to performing NXDOMAIN redirection
        for recursive clients, is also serving a local copy of
        the root zone or using mirroring to provide the root
        zone, although other configurations are also possible.
        Versions affected: BIND 9.12.0-> 9.12.4, 9.14.0. Also
        affects all releases in the 9.13 development
        branch.(CVE-2019-6467)
    
      - With pipelining enabled each incoming query on a TCP
        connection requires a similar resource allocation to a
        query received via UDP or via TCP without pipelining
        enabled. A client using a TCP-pipelined connection to a
        server could consume more resources than the server has
        been provisioned to handle. When a TCP connection with
        a large number of pipelined queries is closed, the load
        on the server releasing these multiple resources can
        cause it to become unresponsive, even for queries that
        can be answered authoritatively or from cache. (This is
        most likely to be perceived as an intermittent server
        problem).(CVE-2019-6477)
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the EulerOS security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues.");
      # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2020-1355
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?2cc9ca9c");
      script_set_attribute(attribute:"solution", value:
    "Update the affected bind packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2020/04/02");
      script_set_attribute(attribute:"plugin_publication_date", value:"2020/04/02");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:bind-export-libs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:bind-libs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:bind-libs-lite");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:bind-license");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:bind-utils");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:python3-bind");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:huawei:euleros:uvp:3.0.6.0");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Huawei Local Security Checks");
    
      script_copyright(english:"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/EulerOS/release", "Host/EulerOS/rpm-list", "Host/EulerOS/uvp_version");
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    
    release = get_kb_item("Host/EulerOS/release");
    if (isnull(release) || release !~ "^EulerOS") audit(AUDIT_OS_NOT, "EulerOS");
    uvp = get_kb_item("Host/EulerOS/uvp_version");
    if (uvp != "3.0.6.0") audit(AUDIT_OS_NOT, "EulerOS Virtualization 3.0.6.0");
    if (!get_kb_item("Host/EulerOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "aarch64" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "EulerOS", cpu);
    if ("aarch64" >!< cpu) audit(AUDIT_ARCH_NOT, "aarch64", cpu);
    
    flag = 0;
    
    pkgs = ["bind-export-libs-9.11.4-10.P2.h19.eulerosv2r8",
            "bind-libs-9.11.4-10.P2.h19.eulerosv2r8",
            "bind-libs-lite-9.11.4-10.P2.h19.eulerosv2r8",
            "bind-license-9.11.4-10.P2.h19.eulerosv2r8",
            "bind-utils-9.11.4-10.P2.h19.eulerosv2r8",
            "python3-bind-9.11.4-10.P2.h19.eulerosv2r8"];
    
    foreach (pkg in pkgs)
      if (rpm_check(release:"EulerOS-2.0", reference:pkg)) flag++;
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_WARNING,
        extra      : rpm_report_get()
      );
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "bind");
    }
    
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2020-1141.NASL
    descriptionAccording to the versions of the bind packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - With pipelining enabled each incoming query on a TCP connection requires a similar resource allocation to a query received via UDP or via TCP without pipelining enabled. A client using a TCP-pipelined connection to a server could consume more resources than the server has been provisioned to handle. When a TCP connection with a large number of pipelined queries is closed, the load on the server releasing these multiple resources can cause it to become unresponsive, even for queries that can be answered authoritatively or from cache. (This is most likely to be perceived as an intermittent server problem).(CVE-2019-6477) - A programming error in the nxdomain-redirect feature can cause an assertion failure in query.c if the alternate namespace used by nxdomain-redirect is a descendant of a zone that is served locally. The most likely scenario where this might occur is if the server, in addition to performing NXDOMAIN redirection for recursive clients, is also serving a local copy of the root zone or using mirroring to provide the root zone, although other configurations are also possible. Versions affected: BIND 9.12.0-> 9.12.4, 9.14.0. Also affects all releases in the 9.13 development branch.(CVE-2019-6467) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-05-03
    modified2020-02-25
    plugin id133975
    published2020-02-25
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/133975
    titleEulerOS 2.0 SP8 : bind (EulerOS-SA-2020-1141)
  • NASL familyPhotonOS Local Security Checks
    NASL idPHOTONOS_PHSA-2020-2_0-0199_BINDUTILS.NASL
    descriptionAn update of the bindutils package has been released.
    last seen2020-06-01
    modified2020-06-02
    plugin id132987
    published2020-01-16
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/132987
    titlePhoton OS 2.0: Bindutils PHSA-2020-2.0-0199