Jump to content

Advisories MDVSA-2010:253: bind


paul
 Share

Recommended Posts

Multiple vulnerabilities were discovered and corrected in bind:

 

named in ISC BIND 9.6.2 before 9.6.2-P3, 9.6-ESV before 9.6-ESV-R3,

and 9.7.x before 9.7.2-P3 does not properly handle the combination

of signed negative responses and corresponding RRSIG records in the

cache, which allows remote attackers to cause a denial of service

(daemon crash) via a query for cached data (CVE-2010-3613).

 

named in ISC BIND 9.x before 9.6.2-P3, 9.7.x before 9.7.2-P3,

9.4-ESV before 9.4-ESV-R4, and 9.6-ESV before 9.6-ESV-R3 does not

properly determine the security status of an NS RRset during a DNSKEY

algorithm rollover, which might allow remote attackers to cause a

denial of service (DNSSEC validation error) by triggering a rollover

(CVE-2010-3614).

 

ISC BIND before 9.7.2-P2, when DNSSEC validation is enabled, does

not properly handle certain bad signatures if multiple trust anchors

exist for a single zone, which allows remote attackers to cause a

denial of service (daemon crash) via a DNS query (CVE-2010-3762).

 

Packages for 2009.0 are provided as of the Extended Maintenance

Program. Please visit this link to learn more:

http://store.mandriva.com/product_info.php?cPath=149&products_id=490

 

The updated packages for Corporate Server 4.0 has been patched to

address these issues.

 

The updated packages for Mandriva Linux 2009.0, 2010.0 and Mandriva

Linux Enterprise Server 5.1 has been upgraded to bind-9.6.2-P3 and

patched to address the CVE-2010-3762 security issue.

 

The updated packages for Mandriva Linux 2010.1 has been upgraded to

bind-9.7.2-P3 which is not vulnerable to these issues.

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
 Share

×
×
  • Create New...