Skip to comments.
Internet vulnerabilities caught in BIND
ZDNet ^
| March 5, 2003, 7:24 AM PT
| Patrick Gray
Posted on 03/05/2003 5:55:32 PM PST by Bush2000
Internet vulnerabilities caught in BIND
By Patrick Gray
ZDNet Australia
March 5, 2003, 7:24 AM PT
Confusion is rife about potential vulnerabilities in BIND, the most commonly used domain name server on the Internet, and experts are calling on the makers of the software to clarify the issue. Domain name servers are used to match domain names to numerical IP addresses, with the vast majority of these running BIND; the software essentially runs the Internet.
The Internet Software Consortium (ISC), the group responsible for maintaining the software, released a new version of BIND on Monday, with their Web site billing it as a maintenance release. "BIND 9.2.2 is the latest release of BIND 9. It is a maintenance release, containing fixes for a number of bugs in 9.2.0 but no new features," it said. However, on Wednesday the site had been updated, saying that ISC had been made aware of vulnerabilities in BIND, and saying that upgrading was "strongly recommended".
BIND 9.2.1, the previous version, is vulnerable to a remote buffer overflow bug when installed with the "libbind" non-default option. Previous versions may also be vulnerable to problems associated with the commonly used OpenSSL library, but again this is a non-default installation option and has more to do with the SSL library than BIND itself.
Johannes Ulrich, chief technology officer of the SANS Institute's Internet Storm Center, believes that ISC has not given the issue the attention it deserves. Ulrich said that the software consortium should "basically do a better PR job by notifying people to the urgency of the release."
"We still don't know enough about it," he added.
Melbourne based security consultant Adam Pointon agrees, and says that ISC should release a detailed advisory on the issue simply to clarify the situation.
"I think they should because the vendors are going to be confused as well as the normal users... no normal users will know about this problem yet," he said.
Ulrich said that the libbind vulnerability may have in fact been indirectly known about for a while now. Confusion about which code was used in which version has lead to uncertainty in regard to which vulnerability effects which version of BIND. "In hindsight it was known since the beginning. That libbind thing is the last of the shared code between [versions] 8 and 9," he said.
Version 9 was more or less a complete rewrite of version 8, and is generally regarded as being a lot more secure.
TOPICS: Business/Economy; Technical
KEYWORDS: bind
Navigation: use the links below to view more comments.
first 1-20, 21-22 next last
Open Source: Quality is Job #1,000,000,000,000 ...
1
posted on
03/05/2003 5:55:32 PM PST
by
Bush2000
To: Bush2000
KNEEPAD bump...
2
posted on
03/05/2003 5:56:45 PM PST
by
BullDog108
(delenda est islam)
To: Bush2000
First Axiom of Software Engineering: Any program of
N lines of source code may be successfully recompiled and run with
N-1 lines of source code.
Second Axiom of Software Engineering: Any program will always have one more bug.
Corollary to the First and Second Axia of Software Engineering: Any program may be recoded until it consists of only one line of source code, which will have a bug.
3
posted on
03/05/2003 5:58:33 PM PST
by
Poohbah
(Beware the fury of a patient man -- John Dryden)
To: Bush2000
Open Source = choice. As in if you don't like BIND (I don't) use something else like DJBDNS.
4
posted on
03/05/2003 6:00:15 PM PST
by
sigSEGV
To: sigSEGV
Also,
NSD is better than BIND.
5
posted on
03/05/2003 6:04:12 PM PST
by
sigSEGV
To: sigSEGV
Open Source = choice. As in if you don't like BIND (I don't) use something else like DJBDNS.
Non-sequitor. You have choice with closed source, too. Use something else. Sheez...
6
posted on
03/05/2003 6:05:02 PM PST
by
Bush2000
To: sigSEGV
Also, NSD is better than BIND.
Now imagine if someone had used a worm to infect these BIND servers a la Slammer. What do you suppose the consequences would have been?
7
posted on
03/05/2003 6:05:50 PM PST
by
Bush2000
To: Bush2000
Slammer hit 6 months after the patch was released. Your typical UNIX/Linux admin has a clue about what is running on their system and gets things like this fixed.
8
posted on
03/05/2003 6:08:53 PM PST
by
sigSEGV
To: sigSEGV
You're blaming Microsoft for admins being idiots?
9
posted on
03/05/2003 6:11:44 PM PST
by
Poohbah
(Beware the fury of a patient man -- John Dryden)
To: Bush2000
And actually, the effects would be minimal. The diversity of operating systems, architectures, etc. that BIND runs on would make a worm almost impossible.
10
posted on
03/05/2003 6:12:24 PM PST
by
sigSEGV
To: Poohbah
Where did I mention Microsoft? Its just very hard to tell what MS boxes are doing behind the scenes.
11
posted on
03/05/2003 6:13:38 PM PST
by
sigSEGV
To: sigSEGV
If you think it's truly that hard to see what an MS box is doing...maybe you shouldn't sysad anything more complicated than an abacus.
12
posted on
03/05/2003 6:16:06 PM PST
by
Poohbah
(Beware the fury of a patient man -- John Dryden)
To: Poohbah
OK. At a glance, tell me (with a default install of an MS operating system), what is listening on UDP port X and how do you shut it off. What patchlevel is your blah blah library at. If I install rollup patch Y, will it overwrite that last patch?... Try stepping into a large company and see for yourself how painful it is.
13
posted on
03/05/2003 6:21:46 PM PST
by
sigSEGV
To: Poohbah
You're blaming Microsoft for admins being idiots? When some of those sysadmins are apparently inside of Microsoft, itself, you've got one of two choices. Either Microsoft hires idiots (from what I know of their hiring practices, I doubt this) or this is even a problem for admins who are smarter than idiots.
Of course the important lesson here is to not have the Internet rely on any single piece of software, be it proprietary or open source. The Internet benefits from having a mix of software that communicates through standard and open protocols. My main complaint about Microsoft is that it tries to close standards via it's "embrace and extend" policy so that it can exclusively control them. No thanks.
To: Bush2000
If the domain name servers do go down, can't we still get to our favorite WEB sites by using the actual IP addresses?
Assuming that we stay on top of what those are.
I ping www.freerepublic.com and get back 209.157.64.200.
15
posted on
03/05/2003 7:13:29 PM PST
by
Abcdefg
To: Abcdefg
If the domain name servers do go down, can't we still get to our favorite WEB sites by using the actual IP addresses? Assuming that we stay on top of what those are. I ping www.freerepublic.com and get back 209.157.64.200.
Assuming you knew the IP address. What do you think that ping uses to resolve freerepublic.com? DNS servers. If they're down, you can't resolve (although it would take a pretty big attack since there is a lot of redundancy in DNS servers).
16
posted on
03/05/2003 9:31:06 PM PST
by
Bush2000
To: sigSEGV
OK. At a glance, tell me (with a default install of an MS operating system), what is listening on UDP port X and how do you shut it off.
No problem. Network Settings|TCP IP|Advanced|IP Filtering.
What patchlevel is your blah blah library at. If I install rollup patch Y, will it overwrite that last patch?... Try stepping into a large company and see for yourself how painful it is.
That isn't easy for any system. The typical way around it is for the component to be subscribed to an AutoUpdate event. But, of course, admins don't like having their servers patched without going through some kind of testing.
17
posted on
03/05/2003 9:34:32 PM PST
by
Bush2000
To: Question_Assumptions
this is even a problem for admins who are smarter than idiots.
This is a problem for all admins. It doesn't matter what system you're administering. Patching is complex and time-consuming.
18
posted on
03/05/2003 9:35:38 PM PST
by
Bush2000
To: sigSEGV
And actually, the effects would be minimal. The diversity of operating systems, architectures, etc. that BIND runs on would make a worm almost impossible.
I disagree. Assuming you picked a one or more common platforms (BSD, Linux, etc), the worm would still propagate rapidly and possibly take down a lot of critical infrastructure.
19
posted on
03/05/2003 9:37:49 PM PST
by
Bush2000
To: sigSEGV
The proof of this fact is provided by Slammer. Obviously, the entire Internet isn't running NT/Win2K+SQL Server -- but it still managed to do tremendous damage.
20
posted on
03/05/2003 9:39:18 PM PST
by
Bush2000
Navigation: use the links below to view more comments.
first 1-20, 21-22 next last
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson