bind9 vulnerability

Related Vulnerabilities: CVE-2009-0025  

It was discovered that Bind did not properly perform signature verification. When DNSSEC with DSA signatures are in use, a remote attacker could exploit this to bypass signature validation to spoof DNS entries and poison DNS caches. Among other things, this could lead to misdirected email and web traffic.

The problem can be corrected by updating your system to the following package versions:

9 January 2009

bind9 vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 8.10
  • Ubuntu 8.04 LTS
  • Ubuntu 7.10
  • Ubuntu 6.06 LTS

Software Description

  • bind9

Details

It was discovered that Bind did not properly perform signature verification. When DNSSEC with DSA signatures are in use, a remote attacker could exploit this to bypass signature validation to spoof DNS entries and poison DNS caches. Among other things, this could lead to misdirected email and web traffic.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 8.10
libdns43 - 1:9.5.0.dfsg.P2-1ubuntu3.1
Ubuntu 8.04 LTS
libdns35 - 1:9.4.2.dfsg.P2-2ubuntu0.1
Ubuntu 7.10
libdns32 - 1:9.4.1-P1-3ubuntu2.1
Ubuntu 6.06 LTS
libdns21 - 1:9.3.2-2ubuntu1.6

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system upgrade is sufficient to effect the necessary changes.

References