Vulnerability in DNS Affects Wide Range of Systems

This is a complex one.

Google announced on Tuesday their discovery of a serious vulnerability in the function ("getaddrinfo") used by the GNU C library ("glibc") on Unix/Linux systems to do DNS lookups. The bug had actually been reported by other researchers back in July of last year, but the potentially serious way in which it could be exploited was not known until now. Google states that exploiting the vulnerability is "not trivial," but that a successful exploitation could enable an attacker to gain complete control of a vulnerable system.

Given that the majority of servers on the Internet are Unix/Linux-based, as are modern Mac computers, Apple i-devices, and Android devices, a serious vulnerability in glibc affects a massive range of computer systems and mobile devices [update -- Apple iOS, Mac OS X, and Android all use different C libraries, not glibc, and are likely not affected]. Patches have started to be released by some vendors, but it may be a week or more (in some case a LOT more) before some systems have a patch.

The vulnerability can only be exploited by a longer-than-normal DNS response. Monitoring for such responses, or using an IPS to block them, could mitigate the vulnerability. Note that these longer responses, or EDNS responses, are required for DNSSEC secure DNS resolution to function. However, in the near term the loss of DNSSEC functionality may be a small sacrifice to avoid potential exploitation of this vulnerability.

On corporate networks, one commonly recommended practice is to configure all internal hosts to forward all DNS requests to a single external resolver, usually located in the network's DMZ. The use of this practice would greatly mitigate the potential impact of this issue for system on organizational networks, as they would not be getting DNS responses directly from external DNS servers.

For more details:
https://googleonlinesecurity.blogspot.ca/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html
https://isc.sans.edu/forums/diary/CVE20157547+Critical+Vulnerability+in+glibc+getaddrinfo/20737/
http://www.theregister.co.uk/2016/02/20/glibc_kaminsky_cve_2015_7547/
http://arstechnica.com/security/2016/02/extremely-severe-bug-leaves-dizzying-number-of-apps-and-devices-vulnerable/
http://www.eweek.com/security/linux-systems-patched-for-critical-glibc-flaw.html
http://malwarejake.blogspot.com/2016/02/problems-with-glibc-getaddrinfo.html

Comments

Popular posts from this blog

Weekly Infosec News Brief: 14-20 March

Weekly Infosec News Brief 20-26 July

Weekly Infosec News Brief: 22-28 February