From: Pieter Lexis Date: Mon, 27 Nov 2017 11:48:20 +0000 (+0100) Subject: Remove the 4.0 security advisories and refer tot he new docs X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=5608121a9eb3c1b3cc2b3cdc8938edb3f3e43e3b;p=thirdparty%2Fpdns.git Remove the 4.0 security advisories and refer tot he new docs --- diff --git a/docs/markdown/security/index.md b/docs/markdown/security/index.md index 740fd53f7a..86e2b25d0c 100644 --- a/docs/markdown/security/index.md +++ b/docs/markdown/security/index.md @@ -4,34 +4,8 @@ If you have a security problem to report, please email us at both >22&0x3C@8>>15&0x01=1" -j DROP - -``` - -If this command is used on a router or firewall, substitute FORWARD for INPUT. - -To solve this issue, we recommend upgrading to the latest packages available for your system. Tarballs and new static builds (32/64bit, RPM/DEB) of 2.9.22.5 and 3.0.1 have been uploaded to [our download site](http://www.powerdns.com/content/downloads.html). Kees Monshouwer has provided updated CentOS/RHEL packages in [his repository](http://www.monshouwer.eu/download/3th_party/). Debian, Fedora and SuSE should have packages available shortly after this announcement. - -For those running custom PowerDNS versions, just applying this patch may be easier: - -``` ---- pdns/common_startup.cc (revision 2326) -+++ pdns/common_startup.cc (working copy) -@@ -253,7 +253,9 @@ - numreceived4++; - else - numreceived6++; -- -+ if(P->d.qr) -+ continue; -+ - S.ringAccount("queries", P->qdomain+"/"+P->qtype.getName()); - S.ringAccount("remotes",P->getRemote()); - if(logDNSQueries) { -``` - -It should apply cleanly to 3.0 and with little trouble to several older releases, including 2.9.22 and 2.9.21. - -This bug resurfaced because over time, the check for 'not responding to responses' moved to the wrong place, allowing certain responses to be processed anyhow. - -We would like to thank Ray Morris of [BetterCGI.com](http://BetterCGI.com/) for bringing this issue to our attention and Aki Tuomi for helping us reproduce the problem. diff --git a/docs/markdown/security/powerdns-advisory-2014-01.md b/docs/markdown/security/powerdns-advisory-2014-01.md deleted file mode 100644 index 5c5ebcb001..0000000000 --- a/docs/markdown/security/powerdns-advisory-2014-01.md +++ /dev/null @@ -1,23 +0,0 @@ -## PowerDNS Security Advisory 2014-01: PowerDNS Recursor 3.6.0 can be crashed remotely - -* CVE: CVE-2014-3614 -* Date: 10th of September 2014 -* Credit: Dedicated PowerDNS users willing to study a crash that happens once every few months (thanks) -* Affects: Only PowerDNS Recursor version 3.6.0. -* Not affected: No other versions of PowerDNS Recursor, no versions of PowerDNS Authoritative Server -* Severity: High -* Impact: Crash -* Exploit: The sequence of packets required is known -* Risk of system compromise: No -* Solution: Upgrade to PowerDNS Recursor 3.6.1 -* Workaround: Restrict service using [`allow-from`](../recursor/settings.md#allow-from), install script that restarts PowerDNS - -Recently, we've discovered that PowerDNS Recursor 3.6.0 (but NOT earlier) can crash when exposed to a specific sequence of malformed packets. This sequence happened spontaneously with one of our largest deployments, and the packets did not appear to have a malicious origin. - -Yet, this crash can be triggered remotely, leading to a denial of service attack. There appears to be no way to use this crash for system compromise or stack overflow. - -Upgrading to 3.6.1 solves the issue. - -In addition, if you want to apply a minimal fix to your own tree, it can be found [here](https://xs.powerdns.com/tmp/minipatch-3.6.1) - -As for workarounds, only clients in allow-from are able to trigger the crash, so this should be limited to your userbase. Secondly, [this](https://github.com/PowerDNS/pdns/blob/master/contrib/upstart-recursor.conf) and [this](https://github.com/PowerDNS/pdns/blob/master/contrib/systemd-pdns-recursor.service) can be used to enable Upstart and Systemd to restart the PowerDNS Recursor automatically. diff --git a/docs/markdown/security/powerdns-advisory-2014-02.md b/docs/markdown/security/powerdns-advisory-2014-02.md deleted file mode 100644 index 9c79c069d7..0000000000 --- a/docs/markdown/security/powerdns-advisory-2014-02.md +++ /dev/null @@ -1,32 +0,0 @@ -## PowerDNS Security Advisory 2014-02: PowerDNS Recursor 3.6.1 and earlier can be made to provide bad service - -* CVE: CVE-2014-8601 -* Date: 8th of December 2014 -* Credit: Florian Maury ([ANSSI](http://www.ssi.gouv.fr/en/)) -* Affects: PowerDNS Recursor versions 3.6.1 and earlier -* Not affected: PowerDNS Recursor 3.6.2; no versions of PowerDNS Authoritative Server -* Severity: High -* Impact: Degraded service -* Exploit: This problem can be triggered by sending queries for specifically configured domains -* Risk of system compromise: No -* Solution: Upgrade to PowerDNS Recursor 3.6.2 -* Workaround: None known. Exposure can be limited by configuring the **allow-from** setting so only trusted users can query your nameserver. - -Recently we released PowerDNS Recursor 3.6.2 with a new feature that -strictly limits the amount of work we'll perform to resolve a single query. -This feature was inspired by performance degradations noted when resolving -domains hosted by 'ezdns.it', which can require thousands of queries to -resolve. - -During the 3.6.2 release process, we were contacted by a government security -agency with news that they had found that all major caching nameservers, -including PowerDNS, could be negatively impacted by specially configured, -hard to resolve domain names. With their permission, we continued the 3.6.2 -release process with the fix for the issue already in there. - -We recommend that all users upgrade to 3.6.2 if at all possible. Alternatively, -if you want to apply a minimal fix to your own tree, it can be found -[here](https://downloads.powerdns.com/patches/2014-02/), including patches for older versions. - -As for workarounds, only clients in allow-from are able to trigger the -degraded service, so this should be limited to your userbase. diff --git a/docs/markdown/security/powerdns-advisory-2015-01.md b/docs/markdown/security/powerdns-advisory-2015-01.md deleted file mode 100644 index 964c760163..0000000000 --- a/docs/markdown/security/powerdns-advisory-2015-01.md +++ /dev/null @@ -1,46 +0,0 @@ -## PowerDNS Security Advisory 2015-01: Label decompression bug can cause crashes or CPU spikes - -* CVE: CVE-2015-1868 (original), CVE-2015-5470 (update) -* Date: 23rd of April 2015, updated 7th of July 2015 -* Credit: Aki Tuomi, Toshifumi Sakaguchi -* Affects: PowerDNS Recursor versions 3.5 and up; Authoritative Server 3.2 and up -* Not affected: Recursor 3.6.4; Recursor 3.7.3; Auth 3.3.3; Auth 3.4.5 -* Severity: High -* Impact: Degraded service -* Exploit: This problem can be triggered by sending queries for specifically configured domains, or by sending specially crafted query packets -* Risk of system compromise: No -* Solution: Upgrade to any of the non-affected versions -* Workaround: Run your Recursor under a supervisor. Exposure can be limited by - configuring the [`allow-from`](../recursor/settings.md#allow-from) setting so - only trusted users can query your nameserver. There is no workaround for the - Authoritative server. - -A bug was discovered in our label decompression code, making it possible for -names to refer to themselves, thus causing a loop during decompression. On -some platforms, this bug can be abused to cause crashes. On all platforms, -this bug can be abused to cause service-affecting CPU spikes. - -We recommend that all users upgrade to a corrected version if at all possible. -Alternatively, if you want to apply a minimal fix to your own tree, please -[find patches here](https://downloads.powerdns.com/patches/2015-01/). - -As for workarounds, for the Recursor: only clients in allow-from are able to -trigger the degraded service, so this should be limited to your userbase; -further, we recommend running your critical services under supervision such -as systemd, supervisord, daemontools, etc. - -There is no workaround for the Authoritative Server. - -We want to thank Aki Tuomi for noticing this in production, and then digging -until he got to the absolute bottom of what at the time appeared to be a -random and spurious failure. - -We want to thank Toshifumi Sakaguchi for further investigation into the issue -after the initial announcement, and for demonstrating to us quite clearly the -CPU spike issues. - -Update 7th of July 2015: Toshifumi Sakaguchi discovered that the original fix -was insufficient in some cases. Updated versions of the Authoritative Server and -Recursor [were released](../changelog.md#powerdns-recursor-364) on the 9th of June. -Minimal patches are [available](http://downloads.powerdns.com/patches/2015-01/). -The insufficient fix was assigned CVE-2015-5470. diff --git a/docs/markdown/security/powerdns-advisory-2015-02.md b/docs/markdown/security/powerdns-advisory-2015-02.md deleted file mode 100644 index 3f3f2cd1ea..0000000000 --- a/docs/markdown/security/powerdns-advisory-2015-02.md +++ /dev/null @@ -1,30 +0,0 @@ -## PowerDNS Security Advisory 2015-02: Packet parsing bug can cause thread or process abortion - -* CVE: CVE-2015-5230 -* Date: 2nd of September 2015 -* Credit: Pyry Hakulinen and Ashish Shukla at Automattic -* Affects: PowerDNS Authoritative Server 3.4.0 through 3.4.5 -* Not affected: PowerDNS Authoritative Server 3.4.6 -* Severity: High -* Impact: Degraded service or Denial of service -* Exploit: This problem can be triggered by sending specially crafted query packets -* Risk of system compromise: No -* Solution: Upgrade to a non-affected version -* Workaround: Run the Authoritative Server inside a supervisor when - `distributor-threads` is set to `1` to prevent Denial of Service. - No workaround for the degraded service exists - -A bug was found in our DNS packet parsing/generation code, which, when exploited, -can cause individual threads (disabling service) or whole processes (allowing a -supervisor to restart them) to crash with just one or a few query packets. - -PowerDNS Authoritative Server 3.4.0-3.4.5 are affected. No other versions are -affected. The PowerDNS Recursor is not affected. - -[PowerDNS Authoritative Server 3.4.6](../changelog.md#powerdns-authoritative-server-346) -contains a fix to this issue. A minimal patch is [available here](https://downloads.powerdns.com/patches/2015-02/). - -This issue is entirely unrelated to [Security Advisory 2015-01](powerdns-advisory-2015-01.md)/CVE-2015-1868. - -We'd like to thank Pyry Hakulinen and Ashish Shukla at Automattic for finding and -subsequently reporting this bug. diff --git a/docs/markdown/security/powerdns-advisory-2015-03.md b/docs/markdown/security/powerdns-advisory-2015-03.md deleted file mode 100644 index 55ea0ec191..0000000000 --- a/docs/markdown/security/powerdns-advisory-2015-03.md +++ /dev/null @@ -1,32 +0,0 @@ -## PowerDNS Security Advisory 2015-03: Packet parsing bug can lead to crashes - -* CVE: CVE-2015-5311 -* Date: November 9th 2015 -* Credit: Christian Hofstaedtler of Deduktiva GmbH -* Affects: PowerDNS Authoritative Server 3.4.4 through 3.4.6 -* Not affected: PowerDNS Authoritative Server 3.3.x and 3.4.7 and up -* Severity: High -* Impact: Degraded service or Denial of service -* Exploit: This problem can be triggered by sending specially crafted query packets -* Risk of system compromise: No -* Solution: Upgrade to a non-affected version -* Workaround: run the process inside the guardian or inside a supervisor - -A bug was found using `afl-fuzz` in our packet parsing code. This bug, when -exploited, causes an assertion error and consequent termination of the the -`pdns_server` process, causing a Denial of Service. - -When the PowerDNS Authoritative Server is run inside the guardian (`--guardian`), -or inside a supervisor like supervisord or systemd, it will be automatically -restarted, limiting the impact to a somewhat degraded service. - -PowerDNS Authoritative Server 3.4.4 - 3.4.6 are affected. No other versions are -affected. The PowerDNS Recursor is not affected. - -[PowerDNS Authoritative Server 3.4.7](../changelog.md#powerdns-authoritative-server-347) -contains a fix to this issue. A minimal patch is [available here](https://downloads.powerdns.com/patches/2015-03/). - -This issue is unrelated to the issues in our previous two Security Announcements -([2015-01](powerdns-advisory-2015-01.md) and [2015-02](powerdns-advisory-2015-02.md)). - -We'd like to thank Christian Hofstaedtler of Deduktiva GmbH for finding and reporting this issue. diff --git a/docs/markdown/security/powerdns-advisory-2016-01.md b/docs/markdown/security/powerdns-advisory-2016-01.md deleted file mode 100644 index 15039c373a..0000000000 --- a/docs/markdown/security/powerdns-advisory-2016-01.md +++ /dev/null @@ -1,24 +0,0 @@ -## PowerDNS Security Advisory 2016-01: Crafted queries can cause unexpected backend load - -* CVE: CVE-2016-5426, CVE-2016-5427 -* Date: 9th of September 2016 -* Credit: Florian Heinz and Martin Kluge -* Affects: PowerDNS Authoritative Server up to and including 3.4.9 -* Not affected: PowerDNS Authoritative Server 3.4.10, 4.x -* Severity: Medium -* Impact: Degraded service or Denial of service -* Exploit: This problem can be triggered by sending specially crafted query packets -* Risk of system compromise: No -* Solution: Upgrade to a non-affected version -* Workaround: Run dnsdist with the rules provided below in front of potentially affected servers, or dimension the backend capacity so that it can handle the increased load. - -Two issues have been found in PowerDNS Authoritative Server allowing a remote, unauthenticated attacker to cause an abnormal load on the PowerDNS backend by sending crafted DNS queries, which might result in a partial denial of service if the backend becomes overloaded. SQL backends for example are particularly vulnerable to this kind of unexpected load if they have not been dimensioned for it. -The first issue is based on the fact that PowerDNS Authoritative Server accepts queries with a qname's length larger than 255 bytes. This issue has been assigned CVE-2016-5426. -The second issue is based on the fact that PowerDNS Authoritative Server does not properly handle dot inside labels. This issue has been assigned CVE-2016-5427. -Both issues have been addressed by this [commit](https://github.com/PowerDNS/pdns/commit/881b5b03a590198d03008e4200dd00cc537712f3). - -PowerDNS Authoritative Server up to and including 3.4.9 is affected. No other versions are affected. The PowerDNS Recursor is not affected. - -dnsdist can be used to block crafted queries, using QNameWireLengthRule() to block queries with a qname larger than 255 bytes and QNameLabelsCountRule() to block queries with a very large amount of labels. Please note that restricting the number of labels in a query might lead to unexpected issues, especially with DNSSEC-enabled domains. - -We'd like to thank Florian Heinz and Martin Kluge for finding and subsequently reporting this issue. diff --git a/docs/markdown/security/powerdns-advisory-2016-02.md b/docs/markdown/security/powerdns-advisory-2016-02.md deleted file mode 100644 index 090b4a837e..0000000000 --- a/docs/markdown/security/powerdns-advisory-2016-02.md +++ /dev/null @@ -1,23 +0,0 @@ -# PowerDNS Security Advisory 2016-02: Crafted queries can cause abnormal CPU usage - - * CVE: CVE-2016-7068 - * Date: December 15th 2016 - * Credit: Florian Heinz and Martin Kluge - * Affects: PowerDNS Authoritative Server up to and including 3.4.10, 4.0.1, PowerDNS Recursor up to and including 3.7.3, 4.0.3 - * Not affected: PowerDNS Authoritative Server 3.4.11, 4.0.2 and PowerDNS Recursor 3.7.4, 4.0.4 - * Severity: Medium - * Impact: Degraded service or Denial of service - * Exploit: This issue can be triggered by sending specially crafted query packets - * Risk of system compromise: No - * Solution: Upgrade to a non-affected version - * Workaround: Run dnsdist with the rules provided below in front of potentially affected servers. - -An issue has been found in PowerDNS allowing a remote, unauthenticated attacker to cause an abnormal CPU usage load on the PowerDNS server by sending crafted DNS queries, which might result in a partial denial of service if the system becomes overloaded. This issue is based on the fact that the PowerDNS server parses all records present in a query regardless of whether they are needed or even legitimate. A specially crafted query containing a large number of records can be used to take advantage of that behaviour. This issue has been assigned CVE-2016-7068. - -PowerDNS Authoritative Server up to and including 3.4.10 and 4.0.1 are affected. PowerDNS Recursor up to and including 3.7.3 and 4.0.3 are affected. - -dnsdist can be used to block crafted queries, using `RecordsCountRule()` and `RecordsTypeCountRule()` to block queries with crafted records. - -For those unable to upgrade to a new version, a minimal patch is [available](https://downloads.powerdns.com/patches/2016-02) - -We would like to thank Florian Heinz and Martin Kluge for finding and subsequently reporting this issue. diff --git a/docs/markdown/security/powerdns-advisory-2016-03.md b/docs/markdown/security/powerdns-advisory-2016-03.md deleted file mode 100644 index a95772554f..0000000000 --- a/docs/markdown/security/powerdns-advisory-2016-03.md +++ /dev/null @@ -1,23 +0,0 @@ -# PowerDNS Security Advisory 2016-03: Denial of service via the web server - - * CVE: CVE-2016-7072 - * Date: December 15th 2016 - * Credit: Mongo - * Affects: PowerDNS Authoritative Server up to and including 3.4.10, 4.0.1 - * Not affected: PowerDNS Authoritative Server 3.4.11, 4.0.2 - * Severity: Medium - * Impact: Degraded service or Denial of service - * Exploit: This issue can be triggered by opening a large number of simultaneous connections to the web server - * Risk of system compromise: No - * Solution: Upgrade to a non-affected version - * Workaround: Disable the web server, or restrict access to it via a firewall. - -An issue has been found in PowerDNS Authoritative Server allowing a remote, unauthenticated attacker to cause a denial of service by opening a large number of TCP connections to the web server. If the web server runs out of file descriptors, it triggers an exception and terminates the whole PowerDNS process. -While it's more complicated for an unauthorized attacker to make the web server run out of file descriptors since its connection will be closed just after being accepted, it might still be possible. -This issue has been assigned CVE-2016-7072. - -PowerDNS Authoritative Server up to and including 3.4.10 and 4.0.1 are affected. The PowerDNS Recursor is not affected. - -For those unable to upgrade to a new version, a minimal patch is [available](https://downloads.powerdns.com/patches/2016-03) - -We would like to thank Mongo for finding and subsequently reporting this issue. diff --git a/docs/markdown/security/powerdns-advisory-2016-04.md b/docs/markdown/security/powerdns-advisory-2016-04.md deleted file mode 100644 index 0c971b23b9..0000000000 --- a/docs/markdown/security/powerdns-advisory-2016-04.md +++ /dev/null @@ -1,22 +0,0 @@ -# PowerDNS Security Advisory 2016-04: Insufficient validation of TSIG signatures - - * CVE: CVE-2016-7073 CVE-2016-7074 - * Date: December 15th 2016 - * Credit: Mongo - * Affects: PowerDNS Authoritative Server up to and including 3.4.10, 4.0.1, PowerDNS Recursor from 4.0.0 and up to and including 4.0.3 - * Not affected: PowerDNS Authoritative Server 3.4.11, 4.0.2, PowerDNS Recursor < 4.0.0, 4.0.4 - * Severity: Medium - * Impact: Zone content alteration - * Exploit: This problem can be triggered by an attacker in position of man-in-the-middle - * Risk of system compromise: No - * Solution: Upgrade to a non-affected version - -Two issues have been found in PowerDNS Authoritative Server allowing an attacker in position of man-in-the-middle to alter the content of an AXFR because of insufficient validation of TSIG signatures. -The first issue is a missing check of the TSIG time and fudge values in `AXFRRetriever`, leading to a possible replay attack. This issue has been assigned CVE-2016-7073. -The second issue is a missing check that the TSIG record is the last one, leading to the possibility of parsing records that are not covered by the TSIG signature. This issue has been assigned CVE-2016-7074. - -PowerDNS Authoritative Server up to and including 3.4.10 and 4.0.1 are affected. PowerDNS Recursor from 4.0.0 up to and including 4.0.3 are affected. - -For those unable to upgrade to a new version, a minimal patch is [available](https://downloads.powerdns.com/patches/2016-04) - -We would like to thank Mongo for finding and subsequently reporting this issue. diff --git a/docs/markdown/security/powerdns-advisory-2016-05.md b/docs/markdown/security/powerdns-advisory-2016-05.md deleted file mode 100644 index edc25477da..0000000000 --- a/docs/markdown/security/powerdns-advisory-2016-05.md +++ /dev/null @@ -1,21 +0,0 @@ -# PowerDNS Security Advisory 2016-05: Crafted zone record can cause a denial of service - - * CVE: CVE-2016-2120 - * Date: December 15th 2016 - * Credit: Mathieu Lafon - * Affects: PowerDNS Authoritative Server up to and including 3.4.10, 4.0.1 - * Not affected: PowerDNS Authoritative Server 3.4.11, 4.0.2 - * Severity: Medium - * Impact: Denial of service - * Exploit: This issue can be triggered by inserting a specially crafted record in a zone - * Risk of system compromise: No - * Solution: Upgrade to a non-affected version - -An issue has been found in PowerDNS Authoritative Server allowing an authorized user to crash the server by inserting a specially crafted record in a zone under their control then sending a DNS query for that record. -The issue is due to an integer overflow when checking if the content of the record matches the expected size, allowing an attacker to cause a read past the buffer boundary. This issue has been assigned CVE-2016-2120. - -PowerDNS Authoritative Server up to and including 3.4.10 and 4.0.1 are affected. The PowerDNS Recursor is not affected. - -For those unable to upgrade to a new version, a minimal patch is [available](https://downloads.powerdns.com/patches/2016-05) - -We would like to thank Mathieu Lafon for finding and subsequently reporting this issue. diff --git a/docs/mkdocs.yml b/docs/mkdocs.yml index ac49ceeae9..6a0f3bfd6a 100644 --- a/docs/mkdocs.yml +++ b/docs/mkdocs.yml @@ -72,24 +72,6 @@ pages: - List of Settings: recursor/settings.md - Security: - Security Policy: security/index.md - - Advisory 2016-05: security/powerdns-advisory-2016-05.md - - Advisory 2016-04: security/powerdns-advisory-2016-04.md - - Advisory 2016-03: security/powerdns-advisory-2016-03.md - - Advisory 2016-02: security/powerdns-advisory-2016-02.md - - Advisory 2016-01: security/powerdns-advisory-2016-01.md - - Advisory 2015-03: security/powerdns-advisory-2015-03.md - - Advisory 2015-02: security/powerdns-advisory-2015-02.md - - Advisory 2015-01: security/powerdns-advisory-2015-01.md - - Advisory 2014-02: security/powerdns-advisory-2014-02.md - - Advisory 2014-01: security/powerdns-advisory-2014-01.md - - Advisory 2012-01: security/powerdns-advisory-2012-01.md - - Advisory 2010-02: security/powerdns-advisory-2010-02.md - - Advisory 2010-01: security/powerdns-advisory-2010-01.md - - Advisory 2008-03: security/powerdns-advisory-2008-03.md - - Advisory 2008-02: security/powerdns-advisory-2008-02.md - - Advisory 2008-01: security/powerdns-advisory-2008-01.md - - Advisory 2006-02: security/powerdns-advisory-2006-02.md - - Advisory 2006-01: security/powerdns-advisory-2006-01.md - Tools and Appendices: - Backend Writer's Guide: appendix/backend-writers-guide.md - Cryptographic software and export control: appendix/crypto-notes-export.md