Change #4777 (introduced in October 2017) introduced an unforeseen issue in releases which were issued after that date, affecting which clients are permitted to make recursive queries to a BIND nameserver. The intended (and documented) behavior is that if an operator has not specified a value for the "allow-recursion" setting, it SHOULD default to one of the following: none, if "recursion no;" is set in named.conf; a value inherited from the "allow-query-cache" or "allow-query" settings IF "recursion yes;" (the default for that setting) AND match lists are explicitly set for "allow-query-cache" or "allow-query" (see the BIND9 Administrative Reference Manual section 6.2 for more details); or the intended default of "allow-recursion {localhost; localnets;};" if "recursion yes;" is in effect and no values are explicitly set for "allow-query-cache" or "allow-query". However, because of the regression introduced by change #4777, it is possible when "recursion yes;" is in effect and no match list values are provided for "allow-query-cache" or "allow-query" for the setting of "allow-recursion" to inherit a setting of all hosts from the "allow-query" setting default, improperly permitting recursion to all clients. Affects BIND 9.9.12, 9.10.7, 9.11.3, 9.12.0->9.12.1-P2, the development release 9.13.0, and also releases 9.9.12-S1, 9.10.7-S1, 9.11.3-S1, and 9.11.3-S2 from BIND 9 Supported Preview Edition.
References
Link | Resource |
---|---|
http://www.securitytracker.com/id/1041115 | Third Party Advisory VDB Entry |
https://kb.isc.org/docs/aa-01616 | Mitigation Vendor Advisory |
https://security.gentoo.org/glsa/201903-13 | Third Party Advisory |
https://security.netapp.com/advisory/ntap-20190830-0002/ | |
https://usn.ubuntu.com/3683-1/ | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: isc
Published: 2018-05-18T00:00:00
Updated: 2019-08-30T16:06:09
Reserved: 2018-01-17T00:00:00
Link: CVE-2018-5738
JSON object: View
NVD Information
Status : Modified
Published: 2019-01-16T20:29:00.907
Modified: 2019-08-30T17:15:11.207
Link: CVE-2018-5738
JSON object: View
Redhat Information
No data.
CWE