[rbldnsd] Announce: rbldnsd-0.97a, a bugfix release
Michael Tokarev
rbldnsd@corpit.ru
Fri, 01 Aug 2003 14:05:20 +0400
Rbldnsd version 0.97a released today, a bugfix release.
From the NEWS file:
0.97a (1 Aug 2003)
- bugfix: ip4parse_range(): invalid addresses was not marked as such,
which may result in various crashes when parsing bogus datafiles.
Note this is remotely exploitable bug: if you grab data from a remote
system, invalid data may crash you server. DNS operations (query
handling etc) aren't affected by this bug, it is in dataset parsing
code.
Please note that this fix also restores previously non-working
detection of non-zero host part in ranges like 1.2.3.4/24 (proper
form is 1.2.3.0/24). If you want to process such address ranges,
specify -e command-line option.
- feature: recognize and ignore "IN" classname in `generic' dataset,
so it is now possible to have
@ IN A 127.0.0.1
The bug in data parsing code has been introduced in version 0.82, when
address ranges in form 127.0.0.1-2 was implemented. The fix may result
in unexpected behaviour as noted above. Originally, rbldnsd was made
to reject address ranges with non-zero host part, so the fix restores
this behaviour (controlled by -e option).
It is highly recommended to upgrade, especially if you use data from
other sources: incorrect data may result in crash of your server or
an endless loop. The bug is very unlikely to be exploitable in a way
that will result in anything more than denial of service, which is
already a severe issue. Note again that the bug is in dataset parsing
code only, it is not possible to trigger it by sending some specially
crafted DNS request.
/mjt