BIND vulnerability

Bug #59202 reported by Patrik Wallström
256
Affects Status Importance Assigned to Milestone
bind9 (Ubuntu)
Fix Released
High
Martin Pitt

Bug Description

Binary package hint: bind9

Haven't seen any indications of that you have seen this update from ISC...

http://www.isc.org/sw/bind/bind9.3.php#security

Please update BIND9 immediately.

CVE References

Revision history for this message
Ondřej Surý (ondrej) wrote :

Version(s): 9.3.2 and prior versions
Description: A vulnerability was reported in BIND. A remote user can
cause denial of service conditions.

A remote user (DNS server) can send specially crafted RRset responses in
return to a recursive SIG query to cause the requesting named service to
crash [CVE-2006-4095].

A remote user can also send specially crafted queries to trigger an
INSIST failure and cause the requesting service(s) to crash [CVE-2006-4096].
Impact: A remote user can cause the target named service to crash.
Solution: The vendor has issued fixed versions (9.3.2-P1, 9.2.7, and
9.2.6-P1), available at: http://www.isc.org/sw/bind/

Revision history for this message
Martin Pitt (pitti) wrote :

Don't worry, such things are on my radar, update is in progress.

Changed in bind9:
assignee: nobody → pitti
importance: Untriaged → High
status: Unconfirmed → In Progress
Revision history for this message
Martin Pitt (pitti) wrote :

Fixed in edgy, pending build and publish in stables.

Changed in bind9:
status: In Progress → Fix Committed
Revision history for this message
Martin Pitt (pitti) wrote :

Fixed stables in USN-343-1.

Changed in bind9:
status: Fix Committed → Fix Released
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.