BIND 10 #145: DNAME-CNAME synthesis can throw if the result is too long.

BIND 10 Development do-not-reply at isc.org
Fri Apr 16 23:58:41 UTC 2010


#145: DNAME-CNAME synthesis can throw if the result is too long.
--------------------------+-------------------------------------------------
 Reporter:  jinmei        |       Owner:  each
     Type:  defect        |      Status:  new 
 Priority:  critical      |   Milestone:      
Component:  Unclassified  |    Keywords:      
Sensitive:  0             |  
--------------------------+-------------------------------------------------
 see r1727.

 BIND 9 catches this case in dns_name_concatenate() and results in
 YXDOMAIN.

 In our case I think we should explicitly identify it rather than let
 Name::concatenate() throw.

 Note that this bug could be "serious" because if the server manages a zone
 containing DNAME (whose target name is longer than owner name), a
 malicious remote node can trigger the bug.  for our current auth server
 implementation catches the exception at a higher level, so it cannot
 actually be used as a DoS, but it's potentially dangerious.  So I
 categorize it as "critical".

 Giving it to Evan.

-- 
Ticket URL: <https://bind10.isc.org/ticket/145>
BIND 10 Development <http://bind10.isc.org>
BIND 10 Development


More information about the bind10-tickets mailing list