CVE-2018-5738

Change #4777 (introduced in October 2017) introduced an unforeseen issue in releases which were issued after that date, affecting which clients are permitted to make recursive queries to a BIND nameserver. The intended (and documented) behavior is that if an operator has not specified a value for the "allow-recursion" setting, it SHOULD default to one of the following: none, if "recursion no;" is set in named.conf; a value inherited from the "allow-query-cache" or "allow-query" settings IF "recursion yes;" (the default for that setting) AND match lists are explicitly set for "allow-query-cache" or "allow-query" (see the BIND9 Administrative Reference Manual section 6.2 for more details); or the intended default of "allow-recursion {localhost; localnets;};" if "recursion yes;" is in effect and no values are explicitly set for "allow-query-cache" or "allow-query". However, because of the regression introduced by change #4777, it is possible when "recursion yes;" is in effect and no match list values are provided for "allow-query-cache" or "allow-query" for the setting of "allow-recursion" to inherit a setting of all hosts from the "allow-query" setting default, improperly permitting recursion to all clients. Affects BIND 9.9.12, 9.10.7, 9.11.3, 9.12.0->9.12.1-P2, the development release 9.13.0, and also releases 9.9.12-S1, 9.10.7-S1, 9.11.3-S1, and 9.11.3-S2 from BIND 9 Supported Preview Edition.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:isc:bind:9.9.12:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.12:s1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.10.7:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.10.7:s1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.11.3:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.11.3:s1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.11.3:s2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.12.0:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.12.0:a1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.12.0:b1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.12.0:b2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.12.0:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.12.0:rc3:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.12.1:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.12.1:p1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.12.1:p2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.13.0:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*

History

21 Nov 2024, 04:09

Type Values Removed Values Added
References () http://www.securitytracker.com/id/1041115 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1041115 - Third Party Advisory, VDB Entry
References () https://kb.isc.org/docs/aa-01616 - Mitigation, Vendor Advisory () https://kb.isc.org/docs/aa-01616 - Mitigation, Vendor Advisory
References () https://security.gentoo.org/glsa/201903-13 - Third Party Advisory () https://security.gentoo.org/glsa/201903-13 - Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20190830-0002/ - () https://security.netapp.com/advisory/ntap-20190830-0002/ -
References () https://usn.ubuntu.com/3683-1/ - Third Party Advisory () https://usn.ubuntu.com/3683-1/ - Third Party Advisory
CVSS v2 : 5.0
v3 : 7.5
v2 : 5.0
v3 : 5.3

Information

Published : 2019-01-16 20:29

Updated : 2024-11-21 04:09


NVD link : CVE-2018-5738

Mitre link : CVE-2018-5738

CVE.ORG link : CVE-2018-5738


JSON object : View

Products Affected

canonical

  • ubuntu_linux

isc

  • bind
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor