Source: maradns
X-Debbugs-CC: [email protected]
Severity: important
Tags: security

Hi,

The following vulnerability was published for maradns.

CVE-2023-31137[0]:
| MaraDNS is open-source software that implements the Domain Name System
| (DNS). In version 3.5.0024 and prior, a remotely exploitable integer
| underflow vulnerability in the DNS packet decompression function
| allows an attacker to cause a Denial of Service by triggering an
| abnormal program termination. The vulnerability exists in the
| `decomp_get_rddata` function within the `Decompress.c` file. When
| handling a DNS packet with an Answer RR of qtype 16 (TXT record) and
| any qclass, if the `rdlength` is smaller than `rdata`, the result of
| the line `Decompress.c:886` is a negative number `len = rdlength -
| total;`. This value is then passed to the `decomp_append_bytes`
| function without proper validation, causing the program to attempt to
| allocate a massive chunk of memory that is impossible to allocate.
| Consequently, the program exits with an error code of 64, causing a
| Denial of Service. One proposed fix for this vulnerability is to patch
| `Decompress.c:887` by breaking `if(len <= 0)`, which has been
| incorporated in version 3.5.0036 via commit
| bab062bde40b2ae8a91eecd522e84d8b993bab58.

https://github.com/samboy/MaraDNS/commit/bab062bde40b2ae8a91eecd522e84d8b993bab58
https://github.com/samboy/MaraDNS/security/advisories/GHSA-58m7-826v-9c3c


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-31137
    https://www.cve.org/CVERecord?id=CVE-2023-31137

Please adjust the affected versions in the BTS as needed.

Reply via email to