Gentoo Archives: gentoo-announce

From: Raphael Marichez <falco@g.o>
To: gentoo-announce@g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200702-06 ] BIND: Denial of Service
Date: Sat, 17 Feb 2007 22:06:37
Message-Id: 20070217215015.GH15700@falco.falcal.net
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200702-06
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: BIND: Denial of Service
9 Date: February 17, 2007
10 Bugs: #163692
11 ID: 200702-06
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 ISC BIND contains two vulnerabilities allowing a Denial of Service
19 under certain conditions.
20
21 Background
22 ==========
23
24 ISC BIND is the Internet Systems Consortium implementation of the
25 Domain Name System (DNS) protocol.
26
27 Affected packages
28 =================
29
30 -------------------------------------------------------------------
31 Package / Vulnerable / Unaffected
32 -------------------------------------------------------------------
33 1 net-dns/bind < 9.3.4 >= 9.3.4
34 *>= 9.2.8
35
36 Description
37 ===========
38
39 An unspecified improper usage of an already freed context has been
40 reported. Additionally, an assertion error could be triggered in the
41 DNSSEC validation of some responses to type ANY queries with multiple
42 RRsets.
43
44 Impact
45 ======
46
47 A remote attacker could crash the server through unspecified vectors
48 or, if DNSSEC validation is enabled, by sending certain crafted ANY
49 queries.
50
51 Workaround
52 ==========
53
54 There is no known workaround at this time for the first issue. The
55 DNSSEC validation Denial of Service can be prevented by disabling
56 DNSSEC validation until the upgrade to a fixed version. Note that
57 DNSSEC validation is disabled on a default configuration.
58
59 Resolution
60 ==========
61
62 All ISC BIND 9.3 users should upgrade to the latest version:
63
64 # emerge --sync
65 # emerge --ask --oneshot --verbose ">=net-dns/bind-9.3.4"
66
67 All ISC BIND 9.2 users should upgrade to the latest version:
68
69 # emerge --sync
70 # emerge --ask --oneshot --verbose ">=net-dns/bind-9.2.8"
71
72 References
73 ==========
74
75 [ 1 ] CVE-2007-0493
76 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0493
77 [ 2 ] CVE-2007-0494
78 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-CVE-2007-0494
79
80 Availability
81 ============
82
83 This GLSA and any updates to it are available for viewing at
84 the Gentoo Security Website:
85
86 http://security.gentoo.org/glsa/glsa-200702-06.xml
87
88 Concerns?
89 =========
90
91 Security is a primary focus of Gentoo Linux and ensuring the
92 confidentiality and security of our users machines is of utmost
93 importance to us. Any security concerns should be addressed to
94 security@g.o or alternatively, you may file a bug at
95 http://bugs.gentoo.org.
96
97 License
98 =======
99
100 Copyright 2007 Gentoo Foundation, Inc; referenced text
101 belongs to its owner(s).
102
103 The contents of this document are licensed under the
104 Creative Commons - Attribution / Share Alike license.
105
106 http://creativecommons.org/licenses/by-sa/2.5