bind9 vulnerabilities

Related Vulnerabilities: CVE-2017-3143   CVE-2017-3142  

Bind could be made to serve incorrect information or expose sensitive information over the network.

Clément Berthaux discovered that Bind did not correctly check TSIG authentication for zone update requests. An attacker could use this to improperly perform zone updates. (CVE-2017-3143)

29 June 2017

bind9 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 17.04
  • Ubuntu 16.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS

Summary

Bind could be made to serve incorrect information or expose sensitive information over the network.

Software Description

  • bind9 - Internet Domain Name Server

Details

Clément Berthaux discovered that Bind did not correctly check TSIG authentication for zone update requests. An attacker could use this to improperly perform zone updates. (CVE-2017-3143)

Clément Berthaux discovered that Bind did not correctly check TSIG authentication for zone transfer requests. An attacker could use this to improperly transfer entire zones. (CVE-2017-3142)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 17.04
bind9 - 1:9.10.3.dfsg.P4-10.1ubuntu5.1
Ubuntu 16.10
bind9 - 1:9.10.3.dfsg.P4-10.1ubuntu1.7
Ubuntu 16.04 LTS
bind9 - 1:9.10.3.dfsg.P4-8ubuntu1.7
Ubuntu 14.04 LTS
bind9 - 1:9.9.5.dfsg-3ubuntu0.15

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart Bind to make all the necessary changes.

References