MaraDNS: Denial of service — GLSA 201202-03

A hash collision vulnerability in MaraDNS allows remote attackers to cause a Denial of Service condition.

Affected packages

net-dns/maradns on all architectures
Affected versions < 1.4.09
Unaffected versions >= 1.4.09

Background

MaraDNS is a proxy DNS server with permanent caching.

Description

MaraDNS does not properly randomize hash functions to protect against hash collision attacks.

Impact

A remote attacker could send many specially crafted DNS recursive queries, possibly resulting in a Denial of Service condition.

Workaround

There is no known workaround at this time.

Resolution

All MaraDNS users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-dns/maradns-1.4.09"
 

References

Release date
February 22, 2012

Latest revision
February 22, 2012: 1

Severity
normal

Exploitable
remote

Bugzilla entries