BIND remote exploit

Related Vulnerabilities: CVE-2007-0493   CVE-2007-0494  

Debian Bug report logs - #408432
BIND remote exploit

version graph

Package: bind9; Maintainer for bind9 is Debian DNS Team <team+dns@tracker.debian.org>; Source for bind9 is src:bind9 (PTS, buildd, popcon).

Reported by: Christian Hammers <ch@debian.org>

Date: Thu, 25 Jan 2007 20:18:02 UTC

Severity: important

Tags: security

Found in versions 9.2.4-1sarge1, 9.3.2-p1.0-1, 9.3.3-1, 9.4.0~rc1.0-3

Fixed in version 1:9.3.4-2

Done: LaMont Jones <lamont@debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, LaMont Jones <lamont@debian.org>:
Bug#408432; Package bind9. (full text, mbox, link).


Acknowledgement sent to Christian Hammers <ch@debian.org>:
New Bug report received and forwarded. Copy sent to LaMont Jones <lamont@debian.org>. (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Christian Hammers <ch@debian.org>
To: submit@bugs.debian.org
Subject: BIND remote exploit
Date: Thu, 25 Jan 2007 20:57:43 +0100
Package: bind9
Version: 9.2.4-1sarge1 9.3.2-P1.0-1 9.3.3-1 9.4.0~rc1.0-3
Tags: security
Severity: grave

Hello

They say "severity low" but if someone causes all nameservers
of my internet provider to "exit unintentionally" continuously,
I guess that becomes a pretty big problem :-)

bye,

-christian-

> ----- "Mark Andrews" <Mark_Andrews@isc.org> wrote:
> > Internet Systems Consortium Security Advisory.
> > 		   BIND 9: dereferencing freed fetch context
> >                              12 January 2007
> > 
> > Versions affected:
> > 
> > 	BIND 9.3.0, 9.3.1, 9.3.2, 9.3.3
> >     BIND 9.4.0a1, 9.4.0a2, 9.4.0a3, 9.4.0a4, 9.4.0a5, 9.4.0a6, 9.4.0b1
> > 	     9.4.0b2, 9.4.0b3, 9.4.0b4, 9.4.0rc1 
> > 	BIND 9.5.0a1 (Bind Forum only)
> > 
> > Severity: Low
> > Exploitable: Remotely
> > 
> > Description:
> > 
> > 	It is possible for the named to dereference (read) a freed
> > 	fetch context.  This can cause named to exit unintentionally.
> > 
> > Workaround:
> > 
> > 	Disable / restrict recursion (to limit exposure).
> > 
> > Fix:
> > 
> > 	Upgrade to BIND 9.2.8, BIND 9.3.4 or BIND 9.4.0rc2.
> > 	Additionally this will be fixed in the upcoming BIND 9.5.0a2.




Severity set to `important' from `grave' Request was from Steve Langasek <vorlon@debian.org> to control@bugs.debian.org. (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, LaMont Jones <lamont@debian.org>:
Bug#408432; Package bind9. (full text, mbox, link).


Acknowledgement sent to Lubomir Kundrak <lkundrak@redhat.com>:
Extra info received and forwarded to list. Copy sent to LaMont Jones <lamont@debian.org>. (full text, mbox, link).


Message #12 received at 408432@bugs.debian.org (full text, mbox, reply):

From: Lubomir Kundrak <lkundrak@redhat.com>
To: 408432@bugs.debian.org
Subject: CVE-2007-0493 Bind after-free() use patch
Date: Fri, 26 Jan 2007 10:22:36 +0100
[Message part 1 (text/plain, inline)]
Here's a patch for two of the issues fixed by the new release. Anyone
isolated a patch for CVE-2007-0494?
-- 
Lubomir Kundrak (Red Hat Security Response Team)
[bind-advisory-2007-01-25.diff (text/x-patch, attachment)]

Reply sent to LaMont Jones <lamont@debian.org>:
You have taken responsibility. (full text, mbox, link).


Notification sent to Christian Hammers <ch@debian.org>:
Bug acknowledged by developer. (full text, mbox, link).


Message #17 received at 408432-done@bugs.debian.org (full text, mbox, reply):

From: LaMont Jones <lamont@debian.org>
To: Christian Hammers <ch@debian.org>, 408432-done@bugs.debian.org
Subject: Re: Bug#408432: BIND remote exploit
Date: Sat, 15 Mar 2008 09:44:19 -0600
Version: 1:9.3.4-2

lamont




Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Sun, 13 Apr 2008 07:36:14 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 17:40:14 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.