BIND 10 #145: DNAME-CNAME synthesis can throw if the result is too long.
BIND 10 Development
do-not-reply at isc.org
Fri Apr 16 23:58:41 UTC 2010
#145: DNAME-CNAME synthesis can throw if the result is too long.
--------------------------+-------------------------------------------------
Reporter: jinmei | Owner: each
Type: defect | Status: new
Priority: critical | Milestone:
Component: Unclassified | Keywords:
Sensitive: 0 |
--------------------------+-------------------------------------------------
see r1727.
BIND 9 catches this case in dns_name_concatenate() and results in
YXDOMAIN.
In our case I think we should explicitly identify it rather than let
Name::concatenate() throw.
Note that this bug could be "serious" because if the server manages a zone
containing DNAME (whose target name is longer than owner name), a
malicious remote node can trigger the bug. for our current auth server
implementation catches the exception at a higher level, so it cannot
actually be used as a DoS, but it's potentially dangerious. So I
categorize it as "critical".
Giving it to Evan.
--
Ticket URL: <https://bind10.isc.org/ticket/145>
BIND 10 Development <http://bind10.isc.org>
BIND 10 Development
More information about the bind10-tickets
mailing list