DSA-409-1 bind -- denial of service

Related Vulnerabilities: CVE-2003-0914  

A vulnerability was discovered in BIND, a domain name server, whereby a malicious name server could return authoritative negative responses with a large TTL (time-to-live) value, thereby rendering a domain name unreachable. A successful attack would require that a vulnerable BIND instance submit a query to a malicious nameserver. The bind9 package is not affected by this vulnerability. For the current stable distribution (woody) this problem has been fixed in version 1:8.3.3-2.0woody2. For the unstable distribution (sid) this problem has been fixed in version 1:8.4.3-1. We recommend that you update your bind package.

Debian Security Advisory

DSA-409-1 bind -- denial of service

Date Reported:
05 Jan 2004
Affected Packages:
bind
Vulnerable:
Yes
Security database references:
In the Bugtraq database (at SecurityFocus): BugTraq ID 9114.
In Mitre's CVE dictionary: CVE-2003-0914.
CERT's vulnerabilities, advisories and incident notes: VU#734644.
More information:

A vulnerability was discovered in BIND, a domain name server, whereby a malicious name server could return authoritative negative responses with a large TTL (time-to-live) value, thereby rendering a domain name unreachable. A successful attack would require that a vulnerable BIND instance submit a query to a malicious nameserver.

The bind9 package is not affected by this vulnerability.

For the current stable distribution (woody) this problem has been fixed in version 1:8.3.3-2.0woody2.

For the unstable distribution (sid) this problem has been fixed in version 1:8.4.3-1.

We recommend that you update your bind package.

Fixed in:

Debian GNU/Linux 3.0 (woody)

Source:
http://security.debian.org/pool/updates/main/b/bind/bind_8.3.3-2.0woody2.dsc
http://security.debian.org/pool/updates/main/b/bind/bind_8.3.3-2.0woody2.diff.gz
http://security.debian.org/pool/updates/main/b/bind/bind_8.3.3.orig.tar.gz
Architecture-independent component:
http://security.debian.org/pool/updates/main/b/bind/bind-doc_8.3.3-2.0woody2_all.deb
Alpha:
http://security.debian.org/pool/updates/main/b/bind/bind_8.3.3-2.0woody2_alpha.deb
http://security.debian.org/pool/updates/main/b/bind/bind-dev_8.3.3-2.0woody2_alpha.deb
ARM:
http://security.debian.org/pool/updates/main/b/bind/bind_8.3.3-2.0woody2_arm.deb
http://security.debian.org/pool/updates/main/b/bind/bind-dev_8.3.3-2.0woody2_arm.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/b/bind/bind_8.3.3-2.0woody2_i386.deb
http://security.debian.org/pool/updates/main/b/bind/bind-dev_8.3.3-2.0woody2_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/b/bind/bind_8.3.3-2.0woody2_ia64.deb
http://security.debian.org/pool/updates/main/b/bind/bind-dev_8.3.3-2.0woody2_ia64.deb
HPPA:
http://security.debian.org/pool/updates/main/b/bind/bind_8.3.3-2.0woody2_hppa.deb
http://security.debian.org/pool/updates/main/b/bind/bind-dev_8.3.3-2.0woody2_hppa.deb
Motorola 680x0:
http://security.debian.org/pool/updates/main/b/bind/bind_8.3.3-2.0woody2_m68k.deb
http://security.debian.org/pool/updates/main/b/bind/bind-dev_8.3.3-2.0woody2_m68k.deb
Big endian MIPS:
http://security.debian.org/pool/updates/main/b/bind/bind_8.3.3-2.0woody2_mips.deb
http://security.debian.org/pool/updates/main/b/bind/bind-dev_8.3.3-2.0woody2_mips.deb
Little endian MIPS:
http://security.debian.org/pool/updates/main/b/bind/bind_8.3.3-2.0woody2_mipsel.deb
http://security.debian.org/pool/updates/main/b/bind/bind-dev_8.3.3-2.0woody2_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/b/bind/bind_8.3.3-2.0woody2_powerpc.deb
http://security.debian.org/pool/updates/main/b/bind/bind-dev_8.3.3-2.0woody2_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/b/bind/bind_8.3.3-2.0woody2_s390.deb
http://security.debian.org/pool/updates/main/b/bind/bind-dev_8.3.3-2.0woody2_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/b/bind/bind_8.3.3-2.0woody2_sparc.deb
http://security.debian.org/pool/updates/main/b/bind/bind-dev_8.3.3-2.0woody2_sparc.deb

MD5 checksums of the listed files are available in the original advisory.