Knowledge Base ISC Main Website Ask a Question/Contact ISC
CVE-2010-3615: allow-query processed incorrectly
Author: Cathy Almond Reference Number: AA-00937 Views: 6523 Created: 2013-05-24 12:42 Last Updated: 2013-05-24 12:42 0 Rating/ Voters

Using "allow-query" in the "options" or "view" statements to restrict access to authoritative zones has no effect.

Posting date: 
01 Dec 2010
Program Impacted: 
BIND
Versions affected: 
9.7.2-P2
Severity: 
High
Exploitable: 
Remotely

Description:

When named is running as an authoritative server for a zone and receives a query for that zone data, it first checks for allow-query acls in the zone statement, then in that view, then in global options. If none of these exist, it defaults to allowing any query (allow-query {"any"};).

With this bug, if the allow-query is not set in the zone statement, it failed to check in view or global options and fell back to the default of allowing any query. This means that queries that the zone owner did not wish to allow were incorrectly allowed.

This bug doesn't affect allow-recursion or allow-query-cache acls, since they are not relevant to a zone for which the server is authoritative.

Impact and Risk Assessment:

The configured acl is not correctly applied, allowing queries that the owner did not wish to allow.

CVSS Score:  7.8

CVSS Equation:  (AV:N/AC:L/Au:N/C:C/I:N/A:N)

For more information on the Common Vulnerability Scoring System and to obtain your specific environmental score please visit: http://nvd.nist.gov/cvss.cfm?version=2&vector=(AV:N/AC:L/Au:N/C:C/I:N/A:N)

Workarounds:

Put the allow-query acl in each zone statement.

Active exploits:

None known at this time.

Solution:

Upgrade to 9.7.2-P3.
9.6ESV-R2 does not have this flaw. We are not patching EOL versions.

Document Revision History:

24Nov - Corrected/Updated Versions affected, CVSS Score and Solution

Related Documents:

See our BIND Security Matrix for a complete listing of Security Vulnerabilities and versions affected.

If you'd like more information on our Forum or product support please visit www.isc.org/support.

Do you still have questions?  Questions regarding this advisory should go to security-officer@isc.org

Note: ISC patches only currently supported versions. When possible we indicate EOL versions affected. Update the 'currently supported versions' to link to the correct URL for the product of this advisory.

ISC Security Vulnerability Disclosure Policy:  Details of our current security advisory policy and practice can be found here: https://www.isc.org/security-vulnerability-disclosure-policy

This Knowledge Base article https://kb.isc.org/article/AA-00937 is the complete and official security advisory document.

Legal Disclaimer:
Internet Systems Consortium (ISC) is providing this notice on an "AS IS" basis. No warranty or guarantee of any kind is expressed in this notice and none should be implied. ISC expressly excludes and disclaims any warranties regarding this notice or materials referred to in this notice, including, without limitation, any implied warranty of merchantability, fitness for a particular purpose, absence of hidden defects, or of non-infringement. Your use or reliance on this notice or materials referred to in this notice is at your own risk. ISC may change this notice at any time.  A stand-alone copy or paraphrase of the text of this document that omits the document URL is an uncontrolled copy. Uncontrolled copies may lack important information, be out of date, or contain factual errors.


© 2001-2015 Internet Systems Consortium

Please help us to improve the content of our knowledge base by letting us know below how we can improve this article.

If you have a technical question or problem on which you'd like help, please don't submit it here as article feedback.

For assistance with problems and questions for which you have not been able to find an answer in our Knowledge Base, we recommend searching our community mailing list archives and/or posting your question there (you will need to register there first for your posts to be accepted). The bind-users and the dhcp-users lists particularly have a long-standing and active membership.

ISC relies on the financial support of the community to fund the development of its open source software products. If you would like to support future product evolution and maintenance as well having peace of mind knowing that our team of experts are poised to provide you with individual technical assistance whenever you call upon them, then please consider our Professional Subscription Support services - details can be found on our main website.

Feedback
  • There is no feedback for this article
Info Submit Feedback on this Article
Nickname: Your Email: Subject: Comment:
Enter the code below:
Quick Jump Menu