This website uses cookies. By clicking Accept, you consent to the use of cookies. Click Here to learn more about how we use cookies.
Accept
Reject

NetWitness Community

  • Home
  • Products
    • NetWitness Platform
      • Advisories
      • Documentation
        • Platform Documentation
        • Known Issues
        • Security Fixes
        • Hardware Documentation
        • Threat Content
        • Unified Data Model
        • Videos
      • Downloads
      • Integrations
      • Knowledge Base
    • NetWitness Cloud SIEM
      • Advisories
      • Documentation
      • Knowledge Base
    • NetWitness Detect AI
      • Advisories
      • Documentation
      • Knowledge Base
    • NetWitness Investigator
    • NetWitness Orchestrator
      • Advisories
      • Documentation
      • Knowledge Base
      • Legacy NetWitness Orchestrator
        • Advisories
        • Documentation
  • Community
    • Blog
    • Discussions
    • Events
    • Idea Exchange
  • Support
    • Case Portal
      • Create New Case
      • View My Cases
      • View My Team's Cases
    • Community Support
      • Getting Started
      • News & Announcements
      • Community Support Forum
      • Community Support Articles
    • Product Life Cycle
    • Support Information
    • General Security Advisories
  • Training
    • Blog
    • Certification Program
    • Course Catalog
    • New Product Readiness
    • On-Demand Subscriptions
    • Student Resources
    • Upcoming Events
  • Technology Partners
  • Trust Center
Sign InRegister Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
NetWitness Knowledge Base Archive
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
Announcement Banner

Users are unable to open Netwitness Support Cases via email. Please open support cases via portal or by phone

View Details
  • NetWitness Community
  • NetWitness Knowledge Base Archive
  • Vulnerabilities Related to DNS for 11.4.x and 11.5.x in NetWitness Platform
  • Options
    • Subscribe to RSS Feed
    • Bookmark
    • Subscribe
    • Email to a Friend
    • Printer Friendly Page
    • Report Inappropriate Content

Vulnerabilities Related to DNS for 11.4.x and 11.5.x in NetWitness Platform

Article Number

000039732

Applies To

RSA Product Set: RSA NetWitness Platform
RSA Product/Service Type: All Devices
RSA Version/Condition: 11.4.x, 11.5.x
Platform: CentOS
O/S Version: 7

Issue

Customer has run a vulnerability scanner against the NetWitness Platform on version 11.4.x or 11.5.x and received one or more of the below DNS vulnerabilities.
  • DNS Server Cache Snooping Remote Information Disclosure Vulnerability
  • DNS Server Dynamic Update Record Injection Vulnerability
  • SA UDP 53 server dynamic update received injection
  • Oilrig (APT34) DNS-Over-HTTPS
  • CVE-2020-25681: Dnsmasq versions before 2.83are susceptible to a heap-based buffer overflow in sort_rrset() when DNSSEC is used. This can allow a remote attacker to write arbitrary data into target device?s memory that can lead to memory corruption and other unexpected behaviors on the target device.
  • CVE-2020-25682: Dnsmasq versions before 2.83 are susceptible to buffer overflow in extract_name() function due to missing length check, when DNSSEC is enabled. This can allow a remote attacker to cause memory corruption on the target device.
  • CVE-2020-25683: Dnsmasq versions before 2.83 are susceptible to a heap-based buffer overflow when DNSSEC is enabled. A remote attacker, who can create valid DNS replies, could use this flaw to cause an overflow in a heap-allocated memory. This flaw is caused by the lack of length checks in rfc1035.c:extract_name(), which could be abused to make the code execute memcpy() with a negative size in get_rdata() and cause a crash in dnsmasq, resulting in a Denial of Service.
  • CVE-2020-25687: Dnsmasq versions before 2.83are vulnerable to a heap-based buffer overflow with large memcpy in sort_rrset() when DNSSEC is enabled. A remote attacker, who can create valid DNS replies, could use this flaw to cause an overflow in a heap-allocated memory. This flaw is caused by the lack of length checks in rfc1035.c:extract_name(), which could be abused to make the code execute memcpy() with a negative size in sort_rrset() and cause a crash in dnsmasq, resulting in a Denial of Service.
  • CVE-2020-25684: A lack of proper address/port check implemented in dnsmasq versions
  • CVE-2020-25685: A lack of query resource name (RRNAME) checks implemented in dnsmasqs versions before 2.83 reply_query function allows remote attackers to spoof DNS traffic that can lead to DNS cache poisoning
  • CVE-2020-25686: Multiple DNS query requests for the same resource name (RRNAME) by dnsmasq versions before 2.83 allows for remote attackers to spoof DNS traffic, using a birthday attack (RFC 5452), that can lead to DNS cache poisoning.
  • CVE-2019-14834: dnsmasq: memory leak in the create_helper() function in /src/helper.c

Resolution

To resolve the vulnerabilities outlined in the Issues section, determine the version of NetWitness Platform that is running in the environment and consult the following sections.

NetWitness 11.4.x Customers

Important: The steps in How to add custom firewall rules after nwsetup-tui has completed in RSA NetWitness Logs & Network 11.x must be followed before performing any steps in this section. If the steps are not followed, the firewall rules can revert back to their original configuration without notice.

For customers on NetWitness 11.4.x that would like to mitigate possible DNS vulnerabilities the option provided below will walk the customer through blocking all DNS requests directed at the NetWitness device.

Note: The following steps need to be performed on all devices.

  1. SSH into the device that contains the DNS vulnerability.
  2. Copy the iptables file from /etc/sysconfig to /root to back up the existing configuration.
> cp /etc/sysconfig/iptables /root/iptables-backup
  1. Edit the existing iptables file and comment out, using the pound (#) symbol, all ACCEPT rules referencing dports 53. Once done, save and exit the file.
> vi /etc/sysconfig/iptables

# -A INPUT -p tcp -m tcp -m multiport --dports 53 -m comment --comment "dnsmasq-tcp-port" -m conntrack --ctstate NEW -j ACCEPT
# -A INPUT -p udp -m udp -m multiport --dports 53 -m comment --comment "dnsmasq-udp-port" -m coontrack --ctstate NEW -j ACCEPT
  1. Reload the iptables rules into the service for the changes to take effect.
> systemctl reload iptables

The above steps will completely block all DNS traffic to the device. If DNS is required but can be restricted to a specific IP address or subnet, a change to the iptables DNS rules can be made instead of commenting them out.

  1. SSH into the device that contains the DNS vulnerability.
  2. Copy the iptables file from /etc/sysconfig to /root to back up the existing configuration.
> cp /etc/sysconfig/iptables /root/iptables-backup
  1. Edit the existing iptables and modify all ACCEPT rules referencing dports 53 to accept traffic only on certain ip/subnets. Once done, save and exit the file.
> vi /etc/sysconfig/iptables

-A INPUT -p tcp -m tcp -m multiport --dports 53 -s 10.10.10.0/24 -m comment --comment "dnsmasq-tcp-port" -m conntrack --ctstate NEW -j ACCEPT
-A INPUT -p udp -m udp -m multiport --dports 53 -s 10.10.10.0/24 -m comment --comment "dnsmasq-udp-port" -m coontrack --ctstate NEW -j ACCEPT
  1. Reload the iptables rules into the service for the changes to take effect.
> systemctl reload iptables
 

NetWitness 11.5.x Customers

In 11.5.x NetWitness no longer uses DNSmasq. It is still enabled to allow for upgrades from 11.4.x and earlier to 11.5.x. Once all NetWitness servers are on 11.5.x, DNSmasq is no longer required. Follow the below steps to restrict DNS access.

  1. SSH into the Admin server.
  2. Create a new directory called nw-component-descriptor.d under /etc/netwitness/component-descriptor/descriptor/<version number>.
Note: <version number> is the version of NetWitness the Admin server is running. Example: 11.5.1
> mkdir /etc/netwitness/component-descriptor/descriptor/11.5.1/nw-component-descriptor.d
  1. Navigate into the newly created nw-component-descriptor.d directory and create a new file, dnsmasq-override.yaml.
> cd /etc/netwitness/component-descriptor/descriptor/11.5.1/nw-component-descriptor.d
> touch dnsmasq-override.yaml
  1. Edit the dnsmasq-override.yaml file.
> vi dnsmasq-override.yaml
  1. Add the following to the open file. Once done, save and exit the file.
components:
   dnsmasq:
      firewall_rules: []
  1. Run the following command to tell the Admin server to use the new configuration file. Node-Zero-Address is the IP address of the Admin server.
> nw-manage --refresh-host --host-key <Node-Zero-Address>
Tags (43)
  • 11.x
  • Break Fix
  • Break Fix Issue
  • Broken
  • Config
  • Configuration
  • Configuration Help
  • Configuration Issue
  • Configuration Problem
  • Configuring Issue
  • Configuring Problem
  • Customer Support Article
  • CVE
  • Issue
  • Issue Configuring
  • Issues
  • KB Article
  • Knowledge Article
  • Knowledge Base
  • NetWitness
  • NetWitness Platform
  • NW
  • Operating System Issue
  • Operation System
  • OS
  • Problem
  • RSA NetWitness
  • RSA NetWitness Platform
  • RSA Security Analytics
  • Security Advisory
  • Security Alert
  • Security Analytics
  • Security Notification
  • Security Recommendations
  • Security Warning
  • Setup Issue
  • SIEM
  • Version 11
  • Version 11.x
  • Vuln
  • Vulnerabilities
  • Vulnerability
  • Vulnerability Warning
0 Likes
Was this article helpful? Yes No
Share
No ratings

In this article

Version history
Last update:
‎2021-06-18 08:49 AM
Updated by:
Administrator RSA-KB-Sync Administrator

Related Content

Powered by Khoros
  • Blog
  • Events
  • Discussions
  • Idea Exchange
  • Knowledge Base
  • Case Portal
  • Community Support
  • Product Life Cycle
  • Support Information
  • About the Community
  • Terms & Conditions
  • Privacy Statement
  • Acceptable Use Policy
  • Employee Login
© 2022 RSA Security LLC or its affiliates. All rights reserved.