int(2968)

Vulnerability Bulletins


Denegación de servicio en Bind

Vulnerability classification

Property Value
Confidence level Oficial
Impact Denegación de Servicio
Dificulty Experto
Required attacker level Acceso remoto sin cuenta a un servicio exotico

System information

Property Value
Affected manufacturer GNU/Linux
Affected software ISC BIND 9.3.0 <= 9.3.3
ISC BIND 9.4.0a1 <= 9.4.0a6
ISC BIND 9.4.0b1 <= 9.4.0b4
ISC BIND 9.4.0rc1
ISC BIND 9.5.0a1

Description

Se ha descubierto una vulnerabilidad en ISC BIND 9.3.0 hasta la versión 9.3.3, 9.4.0a1 hasta la versión 9.4.0a6, 9.4.0b1 hasta la versión 9.4.0b4, 9.4.0rc1, y 9.5.0a1 (sólo en el foro de Bind). La vulnerabilidad reside en un error no especificado.

Un atacante remoto podría causar una denegación de servicio mediante métodos no especificados.

Solution



Actualización de software

Mandriva

Corporate Server 3.0
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/i586/bind-9.2.3-6.3.C30mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/i586/bind-devel-9.2.3-6.3.C30mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/i586/bind-utils-9.2.3-6.3.C30mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/bind-9.2.3-6.3.C30mdk.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/x86_64/bind-9.2.3-6.3.C30mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/x86_64/bind-devel-9.2.3-6.3.C30mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/x86_64/bind-utils-9.2.3-6.3.C30mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/bind-9.2.3-6.3.C30mdk.src.rpm

Multi Network Firewall 2.0
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf/2.0/i586/bind-9.2.3-6.3.M20mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf/2.0/i586/bind-devel-9.2.3-6.3.M20mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf/2.0/i586/bind-utils-9.2.3-6.3.M20mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf/2.0/SRPMS/bind-9.2.3-6.3.M20mdk.src.rpm

Mandriva Linux 2006
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/i586/bind-9.3.1-4.3.20060mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/i586/bind-devel-9.3.1-4.3.20060mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/i586/bind-utils-9.3.1-4.3.20060mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/SRPMS/bind-9.3.1-4.3.20060mdk.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/x86_64/bind-9.3.1-4.3.20060mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/x86_64/bind-devel-9.3.1-4.3.20060mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/x86_64/bind-utils-9.3.1-4.3.20060mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/SRPMS/bind-9.3.1-4.3.20060mdk.src.rpm

Mandriva Linux 2007
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/bind-9.3.2-8.2mdv2007.0.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/bind-devel-9.3.2-8.2mdv2007.0.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/bind-utils-9.3.2-8.2mdv2007.0.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/SRPMS/bind-9.3.2-8.2mdv2007.0.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/bind-9.3.2-8.2mdv2007.0.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/bind-devel-9.3.2-8.2mdv2007.0.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/bind-utils-9.3.2-8.2mdv2007.0.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/SRPMS/bind-9.3.2-8.2mdv2007.0.src.rpm

Corporate Server 4.0
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/i586/bind-9.3.2-7.2.20060mlcs4.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/i586/bind-devel-9.3.2-7.2.20060mlcs4.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/i586/bind-utils-9.3.2-7.2.20060mlcs4.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/SRPMS/bind-9.3.2-7.2.20060mlcs4.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/x86_64/bind-9.3.2-7.2.20060mlcs4.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/x86_64/bind-devel-9.3.2-7.2.20060mlcs4.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/x86_64/bind-utils-9.3.2-7.2.20060mlcs4.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/SRPMS/bind-9.3.2-7.2.20060mlcs4.src.rpm

Suse Linux
Las actualizaciones pueden descargarse mediante YAST o del servidor FTP oficial de Suse Linux

FreeBSD
FreeBSD 5.5, 6.1
http://security.FreeBSD.org/patches/SA-07:02/bind61.patch
http://security.FreeBSD.org/patches/SA-07:02/bind61.patch.asc
FreeBSD 6.2
http://security.FreeBSD.org/patches/SA-07:02/bind62.patch
http://security.FreeBSD.org/patches/SA-07:02/bind62.patch.asc

NetBSD
Actualice desde el CVS, recompile y reinstale el kernel.
ftp://ftp.netbsd.org/pub/NetBSD/NetBSD-current/src/sys/kern/

Red Hat (RHSA-2007:0057-3)
RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
https://rhn.redhat.com/

Apple
Mac OS X (Universal)
http://www.apple.com/support/downloads/securityupdate2007005universal.html
Mac OS X (PPC)
http://www.apple.com/support/downloads/securityupdate2007005ppc.html
Mac OS X (Server)
http://www.apple.com/support/downloads/securityupdate20070051039server.html
Mac OS X (Client)
http://www.apple.com/support/downloads/securityupdate20070051039client.html

Standar resources

Property Value
CVE CVE-2007-0493
BID 22229

Other resources

Mandriva Security Advisory (MDKSA-2007:030)
http://www.mandriva.com/security/advisories?name=MDKSA-2007:030

SUSE Security Advisory (SUSE-SA:2007:014)
http://www.novell.com/linux/security/advisories/2007_14_bind.html

FreeBSD Security Advisory (FreeBSD-SA-07:02.bind)
http://security.freebsd.org/advisories/FreeBSD-SA-07:02.bind.asc

NetBSD Security Advisory (NetBSD-SA2007-003)
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2007-003.txt.asc

Red Hat Security Advisory (RHSA-2007:0057-3)
https://rhn.redhat.com/errata/RHSA-2007-0057.html

Apple Security Update (305530)
http://docs.info.apple.com/article.html?artnum=305530

Version history

Version Comments Date
1.0 Aviso emitido 2007-01-31
1.1 Aviso emitido por Suse (SUSE-SA:2007:014) 2007-02-05
1.2 Aviso emitido por FreeBSD (FreeBSD-SA-07:02.bind) 2007-02-19
1.3 Aviso emitido por NetBSD (NetBSD-SA2007-003) 2007-03-13
1.4 Aviso emitido por Red Hat (RHSA-2007:0057-3) 2007-03-20
1.5 Aviso actualizado por FreeBSD (FreeBSD-SA-07:02.bind) 2007-05-17
1.6 Aviso emitido por Apple (305530) 2007-05-29
Ministerio de Defensa
CNI
CCN
CCN-CERT