bind9 vulnerability

Related Vulnerabilities: CVE-2008-1447  

Dan Kaminsky discovered weaknesses in the DNS protocol as implemented by Bind. A remote attacker could exploit this to spoof DNS entries and poison DNS caches. Among other things, this could lead to misdirected email and web traffic.

The problem can be corrected by updating your system to the following package versions:

8 July 2008

bind9 vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 8.04 LTS
  • Ubuntu 7.10
  • Ubuntu 7.04
  • Ubuntu 6.06 LTS

Software Description

  • bind9

Details

Dan Kaminsky discovered weaknesses in the DNS protocol as implemented by Bind. A remote attacker could exploit this to spoof DNS entries and poison DNS caches. Among other things, this could lead to misdirected email and web traffic.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 8.04 LTS
libdns35 - 1:9.4.2-10ubuntu0.1
Ubuntu 7.10
libdns32 - 1:9.4.1-P1-3ubuntu2
Ubuntu 7.04
libdns22 - 1:9.3.4-2ubuntu2.3
Ubuntu 6.06 LTS
libdns21 - 1:9.3.2-2ubuntu1.5

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system upgrade is sufficient to effect the necessary changes.

References