From owner-doc-jp-work@jp.FreeBSD.org Sun Nov 17 13:43:43 2002
Received: (from daemon@localhost)
	by castle.jp.FreeBSD.org (8.11.6+3.4W/8.11.3) id gAH4hhG48957;
	Sun, 17 Nov 2002 13:43:43 +0900 (JST)
	(envelope-from owner-doc-jp-work@jp.FreeBSD.org)
Received: from smtp.eos.ocn.ne.jp (eos.ocn.ne.jp [211.6.83.117])
	by castle.jp.FreeBSD.org (8.11.6+3.4W/8.11.3) with ESMTP/inet id gAH4hh248952
	for <doc-jp-work@jp.FreeBSD.org>; Sun, 17 Nov 2002 13:43:43 +0900 (JST)
	(envelope-from hrs@eos.ocn.ne.jp)
Received: from mail.allbsd.org (p33186-adsao12honb4-acca.tokyo.ocn.ne.jp [219.161.176.186])
	by smtp.eos.ocn.ne.jp (Postfix) with ESMTP id E84AD2C1F
	for <doc-jp-work@jp.FreeBSD.org>; Sun, 17 Nov 2002 13:43:42 +0900 (JST)
Received: from localhost (alph.allbsd.org [192.168.0.10])
	by mail.allbsd.org (8.12.3/3.7W/DomainMaster) with ESMTP id gAH4g4B2008302
	for <doc-jp-work@jp.FreeBSD.org>; Sun, 17 Nov 2002 13:42:04 +0900 (JST)
	(envelope-from hrs@eos.ocn.ne.jp)
Message-Id: <20021117.134014.78097459.hrs@eos.ocn.ne.jp>
To: doc-jp-work@jp.FreeBSD.org
From: Hiroki Sato <hrs@eos.ocn.ne.jp>
In-Reply-To: <200211130407.gAD47922008226@freefall.freebsd.org>
References: <200211130407.gAD47922008226@freefall.freebsd.org>
X-Mailer: Mew version 2.2 on Emacs 20.7 / Mule 4.0 (HANANOEN)
Mime-Version: 1.0
Content-Type: Multipart/Mixed;
 boundary="--Next_Part(Sun_Nov_17_13:40:14_2002_114)--"
Content-Transfer-Encoding: 7bit
Reply-To: doc-jp-work@jp.FreeBSD.org
Precedence: list
Date: Sun, 17 Nov 2002 13:40:14 +0900
X-Sequence: doc-jp-work 513
Subject: [doc-jp-work 513] Re: ANNOUNCE: FreeBSD Security Advisory FreeBSD-SA-02:42.resolv
Errors-To: owner-doc-jp-work@jp.FreeBSD.org
Sender: owner-doc-jp-work@jp.FreeBSD.org
X-Originator: hrs@eos.ocn.ne.jp
X-Distribute: distribute version 2.1 (Alpha) patchlevel 24e+021111

----Next_Part(Sun_Nov_17_13:40:14_2002_114)--
Content-Type: Text/Plain; charset=iso-2022-jp
Content-Transfer-Encoding: 7bit

$B:4F#!wEl5~M}2JBg3X$G$9!#(B

 02:42 $B$G$9!#(B

--
| $B:4F#(B $B9-@8!wEl5~M}2JBg3X(B <hrs@eos.ocn.ne.jp>
|                         <hrs@FreeBSD.org> (FreeBSD Project)

----Next_Part(Sun_Nov_17_13:40:14_2002_114)--
Content-Type: Text/Plain; charset=iso-2022-jp
Content-Transfer-Encoding: 7bit
Content-Disposition: inline; filename="02:42"


FreeBSD $B%;%-%e%j%F%#4+9p(B $BF|K\8lHG(B
=============================================================================
FreeBSD-SA-02:42.resolv (2002-11-12)
 * buffer overrun in resolver
=============================================================================

 $B$3$N%a!<%k$O(B, announce-jp $B$KN.$l$?(B

  Subject: ANNOUNCE: FreeBSD Security Advisory FreeBSD-SA-02:42.resolv
  From: FreeBSD Security Advisories <security-advisories@FreeBSD.org>
  Date: Tue, 12 Nov 2002 20:07:09 -0800
  Message-Id: <200211130407.gAD47922008226@freefall.freebsd.org>
  X-Sequence: announce-jp 1069

 $B$rF|K\8lLu$7$?$b$N$G$9!#(B

 $B86J8$O(B PGP $B=pL>$5$l$F$$$^$9$,!"$3$NF|K\8lLu$O(B PGP $B=pL>$5$l$F$$$^$;$s!#(B
 $B=$@5%Q%C%AEy$NFbMF$,2~$6$s$5$l$F$$$J$$$3$H$r3NG'$9$k$?$a$K(B PGP $B=pL>$N(B
 $B%A%'%C%/$r9T$J$&$K$O!"86J8$r;2>H$7$F$/$@$5$$!#(B

 $BF|K\8lLu$*$h$S%_%i!<%5%$%HMxMQ$N>\:Y$K$D$$$F$O!"J8Kv$N!V(BA. FreeBSD
 $B%;%-%e%j%F%#4+9p(B $BF|K\8lHG$K$D$$$F!W$r$4Mw$/$@$5$$!#(B


                                     [$BK]Lu<T(B: $B:4F#(B $B9-@8(B <hrs@jp.FreeBSD.org>]
--($B$3$3$+$i(B)

=============================================================================
FreeBSD-SA-02:42.resolv                                     Security Advisory
                                                          The FreeBSD Project

$B%H%T%C%/(B:	$B%j%>%k%P$K$*$1$k%P%C%U%!%*!<%P%i%sLdBj(B
                (buffer overrun in resolver)

$BJ,N`(B:		core
$B%b%8%e!<%k(B:	libc
$B9pCNF|(B:		2002-11-12
$B%/%l%8%C%H(B:	KOZUKA Masahiro <kozuka@masahiro.mbox.media.kyoto-u.ac.jp>,
                Mark Andrews <mark.andrews@isc.org>
$B1F6AHO0O(B:	4.7-RELEASE $B$h$jA0$N$9$Y$F$N%j%j!<%9(B
$B=$@5F|(B:		2002-09-22 12:20:23 2002 UTC (RELENG_4)
                2002-10-23 14:48:21 2002 UTC (RELENG_4_6)
                2002-10-23 14:50:52 2002 UTC (RELENG_4_5)
FreeBSD $B$K8GM-$+(B:	NO


I.   $BGX7J(B - Background

The resolver implements functions for making, sending and interpreting
query and reply messages with Internet domain name servers.
Hostnames, IP addresses, and other information are queried using the
resolver.

$B%j%>%k%P$O!"%$%s%?!<%M%C%H%I%a%$%s%M!<%`%5!<%P$H$NDL?.$G8r$o$5$l$k(B
$BLd$$9g$o$;%a%C%;!<%8$d1~Ez%a%C%;!<%8$r@8@.!&Aw?.!&2r<a$9$k$?$a$N(B
$B4X?t72$r<BAu$7$?$b$N$G$9!#$3$l$O!"%[%9%HL>!"(BIP $B%"%I%l%9$J$I$N(B
$B>pJs$rLd$$9g$o$;$k$?$a$K;H$o$l$^$9!#(B


II.  $BLdBj$N>\:Y(B - Problem Description

Several libc functions --- including getaddrinfo(), gethostbyname(),
getnetbyname(), and others --- utilize the DNS resolver functions
res_search, res_query, and/or res_send.  These resolver functions all
return the length of the query response received, which may be larger
than the buffer supplied to hold the response.  When this is the case,
the resolver-calling function may attempt to read and parse data
beyond the bounds of the buffer it supplied.

getaddrinfo(), gethostbyname(), getnetbyname() $B$J$I$r4^$`(B
$B$$$/$D$+$N(B libc $B4X?t$G$O!"(BDNS $B%j%>%k%P4X?t$G$"$k(B res_search$B!"(B
res_query$B!"(Bres_send $B$,;H$o$l$F$$$^$9!#$3$l$i$N%j%>%k%P4X?t$O(B
$B<u?.$7$?Ld$$9g$o$;1~Ez$ND9$5$rLa$jCM$K$H$k$N$G$9$,!"$3$NCM$O(B
$B1~Ez$rJ];}$9$k$?$a$KMQ0U$5$l$?%P%C%U%!$ND9$5$h$j$bBg$-$/$J$k(B
$B>l9g$,$"$j$^$9!#$=$N$h$&$J>l9g!"%j%>%k%P$r8F$S=P$94X?t$OMQ0U$5$l$?(B
$B%P%C%U%!$N6-3&$rD6$($F%G!<%?$rFI$_=q$-$9$k2DG=@-$,$"$j$^$9!#(B


III. $B1F6AHO0O(B - Impact

A malicious attacker could spoof DNS queries with specially crafted
responses that will not fit in the supplied buffer.  This might cause
some applications to fail (denial-of-service).

$B0-0U$r;}$C$?967b<T$O!"MQ0U$5$l$k%P%C%U%!$ND9$5$rD6$($k$h$&$KFC<l$J:Y9)$r(B
$B;\$7$?56$N(B DNS $BLd$$9g$o$;1~Ez$rAw$k$3$H$,$G$-$k2DG=@-$,$"$j$^$9!#(B
$B$3$l$rMxMQ$7$F!"$$$/$D$+$N%"%W%j%1!<%7%g%s$rDd;_$5$;$k$3$H(B ($B%5!<%S%9K832(B) $B$,(B
$B$G$-$k$+$bCN$l$^$;$s!#(B


IV.  $B2sHrJ}K!(B - Workaround

There is no known workaround.

$B2sHrJ}K!$OH=L@$7$F$$$^$;$s!#(B


V.   $B2r7h:v(B - Solution

Do one of the following:
$B<!$N$$$:$l$+$K=>$C$F$/$@$5$$!#(B

1) Upgrade your vulnerable system to 4.7-RELEASE or 4.7-STABLE; or to
the RELENG_4_7, RELENG_4_6 (4.6-RELEASE-p4), or RELENG_4_5
(4.5-RELEASE-p22) security branch dated after the correction date.
1) $B<eE@$r;}$C$?(B FreeBSD $B%7%9%F%`$r:G?7$N(B 4.7-RELEASE$B!"$b$7$/$O(B 4.7-STABLE $B$K(B
   $B%"%C%W%0%l!<%I$9$k!#$"$k$$$O!"=$@5F|0J9_$N(B RELENG_4_7$B!"(BRELENG_4_6
   (4.6-RELEASE-p4)$B!"(BRELENG_4_5(4.5-RELEASE-p22) $B%;%-%e%j%F%#%V%i%s%A$N(B
   $B$$$:$l$+$K%"%C%W%0%l!<%I$9$k!#(B

2) To patch your present system:
2) $B8=:_$N%7%9%F%`$K=$@5%Q%C%A$rE,MQ$9$k!#(B

The following patch has been verified to apply to FreeBSD 4.5 and
FreeBSD 4.6 systems.
$B0J2<$N=$@5%Q%C%A$O!"(BFreeBSD 4.5$B!"(BFreeBSD 4.6 $B$N3F%7%9%F%`$K(B
$BE,MQ2DG=$J$3$H$,3NG'$5$l$F$$$k$b$N$G$9!#(B

a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.
a) $B0J2<$N>l=j$+$i=$@5%Q%C%A$r%@%&%s%m!<%I$7!"(BPGP $B%f!<%F%#%j%F%#$r;H$C$F(B
   PGP $B=pL>$r3NG'$7$^$9!#(B

# fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-02:42/resolv.patch
# fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-02:42/resolv.patch.asc

b) Execute the following commands as root:
b) root $B8"8B$G<!$N%3%^%s%I$r<B9T$7$^$9!#(B

# cd /usr/src
# patch < /path/to/patch

 ($BLuCm(B: /path/to/patch $B$NItJ,$O=$@5%Q%C%A$N%Q%9L>$KCV$-49$($F$/$@$5$$(B)

c) Recompile the operating system as described in
<URL:http://www.freebsd.org/doc/handbook/makeworld.html>.
c) <URL:http://www.freebsd.org/doc/handbook/makeworld.html> $B$K=q$+$l$F$$$k(B
   $B<j=g$K$7$?$,$C$F%7%9%F%`$r:F9=C[$7!"%7%9%F%`$r:F5/F0$7$^$9!#(B

Note that any statically linked applications that are not part of
the base system (i.e. from the Ports Collection or other 3rd-party
sources) must be recompiled.

$B$^$?!"%Y!<%9%7%9%F%`$K4^$^$l$F$$$J$$!"@EE*$K%j%s%/$5$l$?%P%$%J%j(B
($B$D$^$j(B Ports Collection $B$d%5!<%I%Q!<%F%#@=$N%=!<%9$+$i%3%s%Q%$%k$7$?$b$N(B)
$B$b!"$9$Y$F:F%3%s%Q%$%k$9$kI,MW$,$"$k$3$H$KCm0U$7$F$/$@$5$$!#(B

All affected applications must be restarted for them to use the
corrected library.  Though not required, rebooting may be the easiest
way to accomplish this.

$B99?7$5$l$?%i%$%V%i%j$r;H$&$h$&!"1F6A$r<u$1$k%"%W%j%1!<%7%g%s$O(B
$B$9$Y$F:F5/F0$9$kI,MW$,$"$j$^$9!#I,?\$G$O$"$j$^$;$s$,!"%7%9%F%`$N:F5/F0$,(B
$B$*$=$i$/:G$b4JC1$JJ}K!$G$7$g$&!#(B


VI.  $B=$@5$N>\:Y(B - Correction details

The following list contains the revision numbers of each file that was
corrected in FreeBSD.

FreeBSD $B$K$*$$$F:#2s=$@5$5$l$?3F%U%!%$%k$N%j%S%8%g%sHV9f$O!"0J2<$N$H$*$j$G$9!#(B

Path                                                             Revision
  Branch
$B%Q%9L>(B                                                          $B%j%S%8%g%s(B
  $B%V%i%s%A(B
- -------------------------------------------------------------------------
src/lib/libc/net/getaddrinfo.c
  RELENG_4                                                       1.9.2.11
  RELENG_4_6                                                  1.9.2.9.2.1
  RELENG_4_5                                                  1.9.2.8.4.1
src/lib/libc/net/gethostbydns.c
  RELENG_4                                                       1.27.2.3
  RELENG_4_6                                                    1.27.10.2
  RELENG_4_5                                                     1.27.8.2
src/lib/libc/net/getnetbydns.c
  RELENG_4                                                       1.13.2.3
  RELENG_4_6                                                 1.13.2.1.8.2
  RELENG_4_5                                                 1.13.2.1.6.2
src/lib/libc/net/name6.c
  RELENG_4                                                        1.6.2.7
  RELENG_4_6                                                  1.6.2.5.8.2
  RELENG_4_5                                                  1.6.2.5.6.2
src/lib/libc/net/res_mkquery.c
  RELENG_4                                                       1.15.2.2
  RELENG_4_6                                                 1.15.2.1.6.1
  RELENG_4_5                                                 1.15.2.1.4.1
- -------------------------------------------------------------------------


VII. $B;29M;qNA(B - References

<URL:http://www.kb.cert.org/vuls/id/738331>


A.   FreeBSD $B%;%-%e%j%F%#4+9p(B $BF|K\8lHG$K$D$$$F(B

$BF|K\8lLu$O(B FreeBSD $BF|K\8l%I%-%e%a%s%F!<%7%g%s%W%m%8%'%/%H(B (doc-jp) $B$,(B
$B;29M$N$?$a$KDs6!$9$k$b$N$G$9!#2a5n$NF|K\8lHG%;%-%e%j%F%#4+9p$O(B

 http://www.FreeBSD.org/ja/security/

$B$K$^$H$a$i$l$F$$$^$9!#(B

$B$?$@$7K]Lu<T$*$h$S(B doc-jp $B$O!"$=$NFbMF$K$D$$$F$$$+$J$kJ]>Z$b(B
$B$$$?$7$^$;$s$N$G$4Cm0U$/$@$5$$!#F|K\8lLu$K$D$$$F$N$40U8+!"$4MWK>!"(B
$B$*Ld$$9g$o$;Ey$O(B doc-jp@jp.FreeBSD.org $B$^$G$*4j$$$7$^$9!#(B

$B$3$N4+9p$NCf$G>R2p$5$l$F$$$k(B WWW $B%5%$%H(B http://www.FreeBSD.org/ $B$*$h$S(B
FTP $B%5%$%H(B ftp://ftp.FreeBSD.org/ $B$K$O(B, $BF|K\$N%_%i!<%5%$%H$,B8:_$7$^$9!#(B
$B%M%C%H%o!<%/$N:.;($r4KOB$9$k$?$a!"$^$:$O%_%i!<%5%$%H$NMxMQ$r(B
$B9MN8$9$k$h$&$*4j$$$7$^$9!#(B

$BF|K\$N%_%i!<%5%$%H$rMxMQ$9$k$K$O!"(B
http://www.FreeBSD.org/ $B$r(B http://www.jp.FreeBSD.org/www.freebsd.org/ $B$K!"(B
ftp://ftp.FreeBSD.org/ $B$r(B ftp://ftp.jp.FreeBSD.org/ $B$K!"(B
$B$=$l$>$lCV$-49$($F$/$@$5$$!#(B

$BB>$NCO0h$r4^$`%_%i!<%5%$%H$K4X$9$k>\:Y$O(B

 http://www.FreeBSD.org/handbook/mirror.html ($B1QJ8(B)
 http://www.FreeBSD.org/ja/handbook/mirror.html ($BF|K\8lLu(B)

$B$K$^$H$a$i$l$F$$$^$9!#(B

$hrs: announce-jp/FreeBSD-SA/02:42,v 1.4 2002/11/17 04:39:03 hrs Exp $

----Next_Part(Sun_Nov_17_13:40:14_2002_114)----
