|
|
Message-ID: <4c698fc4-3a1f-e42a-9147-9948cbc247f4@sit.fraunhofer.de>
Date: Sat, 13 Aug 2022 16:58:57 -0700
From: "Philipp Jeitner (SIT)" <philipp.jeitner@....fraunhofer.de>
To: <oss-security@...ts.openwall.com>
Subject: Multiple DNS Cache poisoning vulnerabilities in dnrd DNS forwarder
(CVE-2022-33993, CVE-2022-33992)
We hereby disclose the discovery of multiple DNS Cache poisoning
vulnerabilities in the dnrd DNS forwarder. dnrd is a caching DNS
forwarder/proxy which is unmaintained since about 2007, yet it is still
used in some residential router firmwares. Because the project is
unmaintained, there are no patches available for the described issues.
Our findings are published in our 2022 paper "XDRI Attacks - and - How
to Enhance Resilience of Residential Routers" in August 2022.
Discovery/Credits
-----------------
Philipp Jeitner, Lucas Teichmann and Haya Shulman
Fraunhofer SIT
References
----------
- dnrd: http://dnrd.sourceforge.net/
- paper website: https://xdi-attack.net/
- paper presentation:
https://www.usenix.org/conference/usenixsecurity22/presentation/jeitner
CVE-2022-33993: Misinterpretation of special characters in domain names
leading to cache-poisoning
--------------------------------------------------------------------------------------------------
Misinterpretation of special domain name characters in dnrd leads to
cache-poisoning as domain names and their associated IP addresses are
cached in their misinterpreted form.
## Summary
Attacker can poison the DNS cache of the vulnerable router/forwarder by
triggering queries to attacker controlled domain names whose queries
and/or answers contain special characters (zero-byte or period sign).
These characters are misinterpreted by the vulnerable router/forwarder
so that the attacker can provide addresses for domain names he does not own.
## Impact
Attackers who control a script or web-site which is loaded on a client
of the vulnerable router/forwarder can hijack connections by poisoning
the DNS cache.
## Steps to reproduce
To reproduce, connect a computer to the router and follow the Steps at
https://xdi-attack.net/manual.html or use our downloadable test-tool at
https://xdi-attack.net/test.html (NOT the online test).
## Detailed description and publication timeline
A detailed description of this attack is included in our 2021 USENIX
security paper "Injection Attacks Reloaded: Tunnelling Malicious
Payloads over DNS", see Section 3.2. We conducted further research and
found that these attacks apply to various router models.
CVE-2022-33992: Disabling of DNSSEC protection provided by upstream
resolvers
-----------------------------------------------------------------------------
dnrd forwards and caches DNS queries with checking disabled (CD) bit set
to 1 which leads to disabling of DNSSEC protection provided by upstream
resolvers.
## Summary
The router/forwarder forwards DNS queries with the checking disabled
(CD) bit set to 1 to upstream resolvers and caches the responses
provided by the upstream resolver. The cached answers are then sent to
other clients even when they do set the checking disabled (CD) bit to 0.
## Impact
Attackers which can send DNS queries directly to the vulnerable
router/forwarder can disable DNSSEC protection on the upstream resolver
by sending queries with the checking disabled (CD) bit set to 1. When
the attacker is able to inject DNS responses via another method (e.g.
MitM attacks, BGP hijacking), this allows attacker to hijack connections
from clients of the vulnerable router/forwarder, as DNSSEC protection is
not guaranteed anymore.
## Steps to reproduce
Connect a computer to the vulnerable router/forwarder and trigger the
following DNS queries via `dig`:
$ dig sigfail.verteiltesysteme.net +cdflag @router/forwarder-ip
(should always return 134.91.78.139)
$ dig sigfail.verteiltesysteme.net +short @router/forwarder-ip
(returns 134.91.78.139 if vulnerable, should return nothing)
Note: you can replace `sigfail.verteiltesysteme.net` with any other
domain with broken DNSSEC, such as `www.dnssec-failed.org`, only the
addresses will be different.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.