ISC BIND TKEY Query Out-Of-Bounds Read Information Disclosure Vulnerability

Josef Moellers jmoellers at suse.de
Wed Jun 16 12:33:05 UTC 2021


Hello Tony,

On 16.06.21 13:28, Tony Finch wrote:
> Josef Moellers <jmoellers at suse.de> wrote:
>>
>> So far, I'm still stuck with this problem of backporting the fix.
>> I'm assuming that the information is not to be disclosed, so I'll try
>> and tackle it from a different angle:
> 
> The change you are looking for is:
> 
> 5609.   [func]          The ISC implementation of SPNEGO was removed from BIND 9
>                         source code. It was no longer necessary as all major
>                         contemporary Kerberos/GSSAPI libraries include support
>                         for SPNEGO. [GL #2607]
> 
> The CVE description basically says that they deleted the vulnerable code,
> rather than fixing it, because other Kerberos libraries provide better
> SPNEGO implementations.
> 
> https://kb.isc.org/docs/cve-2021-25216
> 
> So the fix for your backport is to add --disable-isc-spnego to the build
> options, to make it it use Heimdal or MIT Kerberos instead.

You just saved my day! I definitely owe you one.
As I already fixed CVE-2020-8625, ISC's it's probably gone already.

>> How do I send a "TKEY Query" in the first place?
> 
> I have wondered the same thing ...

Thanks again and ... stay healthy!

Josef
-- 
SUSE Software Solutions Germany GmbH
Maxfeldstr. 5
90409 Nürnberg
Germany

(HRB 36809, AG Nürnberg)
Geschäftsführer: Felix Imendörffer


More information about the bind-workers mailing list