2
0
mirror of https://gitlab.isc.org/isc-projects/bind9 synced 2025-08-30 14:07:59 +00:00

Part 2 of:

4319.   [security]      Fix resolver assertion failure due to improper
                        DNAME handling when parsing fetch reply messages.
                        (CVE-2016-1286) [RT #41753]
This commit is contained in:
Mark Andrews
2016-02-29 07:16:48 +11:00
parent d9ec4ca4b6
commit 2de89ee9de

View File

@@ -6142,14 +6142,11 @@ cname_target(dns_rdataset_t *rdataset, dns_name_t *tname) {
} }
static inline isc_result_t static inline isc_result_t
dname_target(fetchctx_t *fctx, dns_rdataset_t *rdataset, dns_name_t *qname, dname_target(dns_rdataset_t *rdataset, dns_name_t *qname,
dns_name_t *oname, dns_fixedname_t *fixeddname) unsigned int nlabels, dns_fixedname_t *fixeddname)
{ {
isc_result_t result; isc_result_t result;
dns_rdata_t rdata = DNS_RDATA_INIT; dns_rdata_t rdata = DNS_RDATA_INIT;
unsigned int nlabels;
int order;
dns_namereln_t namereln;
dns_rdata_dname_t dname; dns_rdata_dname_t dname;
dns_fixedname_t prefix; dns_fixedname_t prefix;
@@ -6164,21 +6161,6 @@ dname_target(fetchctx_t *fctx, dns_rdataset_t *rdataset, dns_name_t *qname,
if (result != ISC_R_SUCCESS) if (result != ISC_R_SUCCESS)
return (result); return (result);
/*
* Get the prefix of qname.
*/
namereln = dns_name_fullcompare(qname, oname, &order, &nlabels);
if (namereln != dns_namereln_subdomain) {
char qbuf[DNS_NAME_FORMATSIZE];
char obuf[DNS_NAME_FORMATSIZE];
dns_rdata_freestruct(&dname);
dns_name_format(qname, qbuf, sizeof(qbuf));
dns_name_format(oname, obuf, sizeof(obuf));
log_formerr(fctx, "unrelated DNAME in answer: "
"%s is not in %s", qbuf, obuf);
return (DNS_R_FORMERR);
}
dns_fixedname_init(&prefix); dns_fixedname_init(&prefix);
dns_name_split(qname, nlabels, dns_fixedname_name(&prefix), NULL); dns_name_split(qname, nlabels, dns_fixedname_name(&prefix), NULL);
dns_fixedname_init(fixeddname); dns_fixedname_init(fixeddname);
@@ -6796,13 +6778,13 @@ static isc_result_t
answer_response(fetchctx_t *fctx) { answer_response(fetchctx_t *fctx) {
isc_result_t result; isc_result_t result;
dns_message_t *message; dns_message_t *message;
dns_name_t *name, *qname, tname, *ns_name; dns_name_t *name, *dname, *qname, tname, *ns_name;
dns_rdataset_t *rdataset, *ns_rdataset; dns_rdataset_t *rdataset, *ns_rdataset;
isc_boolean_t done, external, chaining, aa, found, want_chaining; isc_boolean_t done, external, chaining, aa, found, want_chaining;
isc_boolean_t have_answer, found_cname, found_type, wanted_chaining; isc_boolean_t have_answer, found_cname, found_type, wanted_chaining;
unsigned int aflag; unsigned int aflag;
dns_rdatatype_t type; dns_rdatatype_t type;
dns_fixedname_t dname, fqname; dns_fixedname_t fdname, fqname;
dns_view_t *view; dns_view_t *view;
FCTXTRACE("answer_response"); FCTXTRACE("answer_response");
@@ -6830,10 +6812,15 @@ answer_response(fetchctx_t *fctx) {
view = fctx->res->view; view = fctx->res->view;
result = dns_message_firstname(message, DNS_SECTION_ANSWER); result = dns_message_firstname(message, DNS_SECTION_ANSWER);
while (!done && result == ISC_R_SUCCESS) { while (!done && result == ISC_R_SUCCESS) {
dns_namereln_t namereln;
int order;
unsigned int nlabels;
name = NULL; name = NULL;
dns_message_currentname(message, DNS_SECTION_ANSWER, &name); dns_message_currentname(message, DNS_SECTION_ANSWER, &name);
external = ISC_TF(!dns_name_issubdomain(name, &fctx->domain)); external = ISC_TF(!dns_name_issubdomain(name, &fctx->domain));
if (dns_name_equal(name, qname)) { namereln = dns_name_fullcompare(qname, name, &order, &nlabels);
if (namereln == dns_namereln_equal) {
wanted_chaining = ISC_FALSE; wanted_chaining = ISC_FALSE;
for (rdataset = ISC_LIST_HEAD(name->list); for (rdataset = ISC_LIST_HEAD(name->list);
rdataset != NULL; rdataset != NULL;
@@ -6958,10 +6945,11 @@ answer_response(fetchctx_t *fctx) {
*/ */
INSIST(!external); INSIST(!external);
if (aflag == if (aflag ==
DNS_RDATASETATTR_ANSWER) DNS_RDATASETATTR_ANSWER) {
have_answer = ISC_TRUE; have_answer = ISC_TRUE;
name->attributes |= name->attributes |=
DNS_NAMEATTR_ANSWER; DNS_NAMEATTR_ANSWER;
}
rdataset->attributes |= aflag; rdataset->attributes |= aflag;
if (aa) if (aa)
rdataset->trust = rdataset->trust =
@@ -7016,6 +7004,8 @@ answer_response(fetchctx_t *fctx) {
if (wanted_chaining) if (wanted_chaining)
chaining = ISC_TRUE; chaining = ISC_TRUE;
} else { } else {
dns_rdataset_t *dnameset = NULL;
/* /*
* Look for a DNAME (or its SIG). Anything else is * Look for a DNAME (or its SIG). Anything else is
* ignored. * ignored.
@@ -7023,10 +7013,8 @@ answer_response(fetchctx_t *fctx) {
wanted_chaining = ISC_FALSE; wanted_chaining = ISC_FALSE;
for (rdataset = ISC_LIST_HEAD(name->list); for (rdataset = ISC_LIST_HEAD(name->list);
rdataset != NULL; rdataset != NULL;
rdataset = ISC_LIST_NEXT(rdataset, link)) { rdataset = ISC_LIST_NEXT(rdataset, link))
isc_boolean_t found_dname = ISC_FALSE; {
dns_name_t *dname_name;
/* /*
* Only pass DNAME or RRSIG(DNAME). * Only pass DNAME or RRSIG(DNAME).
*/ */
@@ -7040,20 +7028,41 @@ answer_response(fetchctx_t *fctx) {
* its signature should not be external. * its signature should not be external.
*/ */
if (!chaining && external) { if (!chaining && external) {
log_formerr(fctx, "external DNAME"); char qbuf[DNS_NAME_FORMATSIZE];
char obuf[DNS_NAME_FORMATSIZE];
dns_name_format(name, qbuf,
sizeof(qbuf));
dns_name_format(&fctx->domain, obuf,
sizeof(obuf));
log_formerr(fctx, "external DNAME or "
"RRSIG covering DNAME "
"in answer: %s is "
"not in %s", qbuf, obuf);
return (DNS_R_FORMERR);
}
if (namereln != dns_namereln_subdomain) {
char qbuf[DNS_NAME_FORMATSIZE];
char obuf[DNS_NAME_FORMATSIZE];
dns_name_format(qname, qbuf,
sizeof(qbuf));
dns_name_format(name, obuf,
sizeof(obuf));
log_formerr(fctx, "unrelated DNAME "
"in answer: %s is "
"not in %s", qbuf, obuf);
return (DNS_R_FORMERR); return (DNS_R_FORMERR);
} }
found = ISC_FALSE;
aflag = 0; aflag = 0;
if (rdataset->type == dns_rdatatype_dname) { if (rdataset->type == dns_rdatatype_dname) {
found = ISC_TRUE;
want_chaining = ISC_TRUE; want_chaining = ISC_TRUE;
POST(want_chaining); POST(want_chaining);
aflag = DNS_RDATASETATTR_ANSWER; aflag = DNS_RDATASETATTR_ANSWER;
result = dname_target(fctx, rdataset, result = dname_target(rdataset, qname,
qname, name, nlabels, &fdname);
&dname);
if (result == ISC_R_NOSPACE) { if (result == ISC_R_NOSPACE) {
/* /*
* We can't construct the * We can't construct the
@@ -7065,14 +7074,12 @@ answer_response(fetchctx_t *fctx) {
} else if (result != ISC_R_SUCCESS) } else if (result != ISC_R_SUCCESS)
return (result); return (result);
else else
found_dname = ISC_TRUE; dnameset = rdataset;
dname_name = dns_fixedname_name(&dname); dname = dns_fixedname_name(&fdname);
if (!is_answertarget_allowed(view, if (!is_answertarget_allowed(view,
qname, qname, rdataset->type,
rdataset->type, dname, &fctx->domain)) {
dname_name,
&fctx->domain)) {
return (DNS_R_SERVFAIL); return (DNS_R_SERVFAIL);
} }
} else { } else {
@@ -7080,32 +7087,28 @@ answer_response(fetchctx_t *fctx) {
* We've found a signature that * We've found a signature that
* covers the DNAME. * covers the DNAME.
*/ */
found = ISC_TRUE;
aflag = DNS_RDATASETATTR_ANSWERSIG; aflag = DNS_RDATASETATTR_ANSWERSIG;
} }
if (found) {
/* /*
* We've found an answer to our * We've found an answer to our
* question. * question.
*/ */
name->attributes |= name->attributes |= DNS_NAMEATTR_CACHE;
DNS_NAMEATTR_CACHE; rdataset->attributes |= DNS_RDATASETATTR_CACHE;
rdataset->attributes |=
DNS_RDATASETATTR_CACHE;
rdataset->trust = dns_trust_answer; rdataset->trust = dns_trust_answer;
if (!chaining) { if (!chaining) {
/* /*
* This data is "the" answer * This data is "the" answer to
* to our question only if * our question only if we're
* we're not chaining. * not chaining.
*/ */
INSIST(!external); INSIST(!external);
if (aflag == if (aflag == DNS_RDATASETATTR_ANSWER) {
DNS_RDATASETATTR_ANSWER)
have_answer = ISC_TRUE; have_answer = ISC_TRUE;
name->attributes |= name->attributes |=
DNS_NAMEATTR_ANSWER; DNS_NAMEATTR_ANSWER;
}
rdataset->attributes |= aflag; rdataset->attributes |= aflag;
if (aa) if (aa)
rdataset->trust = rdataset->trust =
@@ -7114,38 +7117,29 @@ answer_response(fetchctx_t *fctx) {
rdataset->attributes |= rdataset->attributes |=
DNS_RDATASETATTR_EXTERNAL; DNS_RDATASETATTR_EXTERNAL;
} }
}
/* /*
* DNAME chaining. * DNAME chaining.
*/ */
if (found_dname) { if (dnameset != NULL) {
/* /*
* Copy the dname into the * Copy the dname into the qname fixed name.
* qname fixed name.
* *
* Although we check for * Although we check for failure of the copy
* failure of the copy * operation, in practice it should never fail
* operation, in practice it * since we already know that the result fits
* should never fail since * in a fixedname.
* we already know that the
* result fits in a fixedname.
*/ */
dns_fixedname_init(&fqname); dns_fixedname_init(&fqname);
result = dns_name_copy( qname = dns_fixedname_name(&fqname);
dns_fixedname_name(&dname), result = dns_name_copy(dname, qname, NULL);
dns_fixedname_name(&fqname),
NULL);
if (result != ISC_R_SUCCESS) if (result != ISC_R_SUCCESS)
return (result); return (result);
wanted_chaining = ISC_TRUE; wanted_chaining = ISC_TRUE;
name->attributes |= name->attributes |= DNS_NAMEATTR_CHAINING;
DNS_NAMEATTR_CHAINING; dnameset->attributes |=
rdataset->attributes |=
DNS_RDATASETATTR_CHAINING; DNS_RDATASETATTR_CHAINING;
qname = dns_fixedname_name(
&fqname);
}
}
} }
if (wanted_chaining) if (wanted_chaining)
chaining = ISC_TRUE; chaining = ISC_TRUE;