bind9 vulnerabilities

Related Vulnerabilities: CVE-2010-0097   CVE-2009-4022   CVE-2010-0290  

It was discovered that Bind would incorrectly cache bogus NXDOMAIN responses. When DNSSEC validation is in use, a remote attacker could exploit this to cause a denial of service, and possibly poison DNS caches. (CVE-2010-0097)

USN-865-1 provided updated Bind packages to fix a security vulnerability. The upstream security patch to fix CVE-2009-4022 was incomplete and CVE-2010-0290 was assigned to the issue. This update corrects the problem. Original advisory details:

20 January 2010

bind9 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 9.10
  • Ubuntu 9.04
  • Ubuntu 8.10
  • Ubuntu 8.04 LTS
  • Ubuntu 6.06 LTS

Software Description

  • bind9

Details

It was discovered that Bind would incorrectly cache bogus NXDOMAIN responses. When DNSSEC validation is in use, a remote attacker could exploit this to cause a denial of service, and possibly poison DNS caches. (CVE-2010-0097)

USN-865-1 provided updated Bind packages to fix a security vulnerability. The upstream security patch to fix CVE-2009-4022 was incomplete and CVE-2010-0290 was assigned to the issue. This update corrects the problem. Original advisory details:

Michael Sinatra discovered that Bind did not correctly validate certain records added to its cache. When DNSSEC validation is in use, a remote attacker could exploit this to spoof DNS entries and poison DNS caches. Among other things, this could lead to misdirected email and web traffic.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 9.10
libdns53 - 1:9.6.1.dfsg.P1-3ubuntu0.3
Ubuntu 9.04
libdns46 - 1:9.5.1.dfsg.P2-1ubuntu0.4
Ubuntu 8.10
libdns44 - 1:9.5.0.dfsg.P2-1ubuntu3.5
Ubuntu 8.04 LTS
libdns36 - 1:9.4.2.dfsg.P2-2ubuntu0.5
Ubuntu 6.06 LTS
libdns23 - 1:9.3.2-2ubuntu1.11

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system upgrade is sufficient to effect the necessary changes.

References