int(2964)

Boletines de Vulnerabilidades


Denegación de servicio en BIND

Clasificación de la vulnerabilidad

Propiedad Valor
Nivel de Confianza Oficial
Impacto Denegación de Servicio
Dificultad Experto
Requerimientos del atacante Acceso remoto sin cuenta a un servicio exotico

Información sobre el sistema

Propiedad Valor
Fabricante afectado GNU/Linux
Software afectado ISC BIND 9.0.x
ISC BIND 9.1.x
ISC BIND 9.2.0 <= 9.2.7
ISC BIND 9.3.0 <= 9.3.3
ISC BIND 9.4.0a1 <= 9.4.0a6
ISC BIND 9.4.0b1 <= 9.4.0b4
ISC BIND 9.4.0rc1
ISC BIND 9.5.0a1

Descripción

Se ha descubierto una vulnerabilidad en ISC BIND 9.0.x, 9.1.x, 9.2.0 hasta la versión 9.2.7, 9.3.0 hasta la versión 9.3.3, 9.4.0a1 hasta la versión 9.4.0a6, 9.4.0b1 hasta la versión 9.4.0b4, 9.4.0rc1, y 9.5.0a1 (sólo en el foro de Bind). La vulnerabilidad reside en un error cuando procesa peticiones DNS.

Un atacante remoto podría causar una denegación de servicio mediante una petición DNS del tipo * (ANY) dónde la respuesta contendría múltiples RRsets que provocaría el error.

Solución



Actualización de software

Debian

Debian Linux 3.1
Source
http://security.debian.org/pool/updates/main/b/bind9/bind9_9.2.4-1sarge2.dsc
http://security.debian.org/pool/updates/main/b/bind9/bind9_9.2.4-1sarge2.diff.gz
http://security.debian.org/pool/updates/main/b/bind9/bind9_9.2.4.orig.tar.gz
Architecture independent
http://security.debian.org/pool/updates/main/b/bind9/bind9-doc_9.2.4-1sarge2_all.deb
Alpha
http://security.debian.org/pool/updates/main/b/bind9/bind9_9.2.4-1sarge2_alpha.deb
http://security.debian.org/pool/updates/main/b/bind9/bind9-host_9.2.4-1sarge2_alpha.deb
http://security.debian.org/pool/updates/main/b/bind9/dnsutils_9.2.4-1sarge2_alpha.deb
http://security.debian.org/pool/updates/main/b/bind9/libbind-dev_9.2.4-1sarge2_alpha.deb
http://security.debian.org/pool/updates/main/b/bind9/libdns16_9.2.4-1sarge2_alpha.deb
http://security.debian.org/pool/updates/main/b/bind9/libisc7_9.2.4-1sarge2_alpha.deb
http://security.debian.org/pool/updates/main/b/bind9/libisccc0_9.2.4-1sarge2_alpha.deb
http://security.debian.org/pool/updates/main/b/bind9/libisccfg0_9.2.4-1sarge2_alpha.deb
http://security.debian.org/pool/updates/main/b/bind9/liblwres1_9.2.4-1sarge2_alpha.deb
http://security.debian.org/pool/updates/main/b/bind9/lwresd_9.2.4-1sarge2_alpha.deb
AMD64
http://security.debian.org/pool/updates/main/b/bind9/bind9_9.2.4-1sarge2_amd64.deb
http://security.debian.org/pool/updates/main/b/bind9/bind9-host_9.2.4-1sarge2_amd64.deb
http://security.debian.org/pool/updates/main/b/bind9/dnsutils_9.2.4-1sarge2_amd64.deb
http://security.debian.org/pool/updates/main/b/bind9/libbind-dev_9.2.4-1sarge2_amd64.deb
http://security.debian.org/pool/updates/main/b/bind9/libdns16_9.2.4-1sarge2_amd64.deb
http://security.debian.org/pool/updates/main/b/bind9/libisc7_9.2.4-1sarge2_amd64.deb
http://security.debian.org/pool/updates/main/b/bind9/libisccc0_9.2.4-1sarge2_amd64.deb
http://security.debian.org/pool/updates/main/b/bind9/libisccfg0_9.2.4-1sarge2_amd64.deb
http://security.debian.org/pool/updates/main/b/bind9/liblwres1_9.2.4-1sarge2_amd64.deb
http://security.debian.org/pool/updates/main/b/bind9/lwresd_9.2.4-1sarge2_amd64.deb
ARM
http://security.debian.org/pool/updates/main/b/bind9/bind9_9.2.4-1sarge2_arm.deb
http://security.debian.org/pool/updates/main/b/bind9/bind9-host_9.2.4-1sarge2_arm.deb
http://security.debian.org/pool/updates/main/b/bind9/dnsutils_9.2.4-1sarge2_arm.deb
http://security.debian.org/pool/updates/main/b/bind9/libbind-dev_9.2.4-1sarge2_arm.deb
http://security.debian.org/pool/updates/main/b/bind9/libdns16_9.2.4-1sarge2_arm.deb
http://security.debian.org/pool/updates/main/b/bind9/libisc7_9.2.4-1sarge2_arm.deb
http://security.debian.org/pool/updates/main/b/bind9/libisccc0_9.2.4-1sarge2_arm.deb
http://security.debian.org/pool/updates/main/b/bind9/libisccfg0_9.2.4-1sarge2_arm.deb
http://security.debian.org/pool/updates/main/b/bind9/liblwres1_9.2.4-1sarge2_arm.deb
http://security.debian.org/pool/updates/main/b/bind9/lwresd_9.2.4-1sarge2_arm.deb
HP Precision
http://security.debian.org/pool/updates/main/b/bind9/bind9_9.2.4-1sarge2_hppa.deb
http://security.debian.org/pool/updates/main/b/bind9/bind9-host_9.2.4-1sarge2_hppa.deb
http://security.debian.org/pool/updates/main/b/bind9/dnsutils_9.2.4-1sarge2_hppa.deb
http://security.debian.org/pool/updates/main/b/bind9/libbind-dev_9.2.4-1sarge2_hppa.deb
http://security.debian.org/pool/updates/main/b/bind9/libdns16_9.2.4-1sarge2_hppa.deb
http://security.debian.org/pool/updates/main/b/bind9/libisc7_9.2.4-1sarge2_hppa.deb
http://security.debian.org/pool/updates/main/b/bind9/libisccc0_9.2.4-1sarge2_hppa.deb
http://security.debian.org/pool/updates/main/b/bind9/libisccfg0_9.2.4-1sarge2_hppa.deb
http://security.debian.org/pool/updates/main/b/bind9/liblwres1_9.2.4-1sarge2_hppa.deb
http://security.debian.org/pool/updates/main/b/bind9/lwresd_9.2.4-1sarge2_hppa.deb
Intel IA-32
http://security.debian.org/pool/updates/main/b/bind9/bind9_9.2.4-1sarge2_i386.deb
http://security.debian.org/pool/updates/main/b/bind9/bind9-host_9.2.4-1sarge2_i386.deb
http://security.debian.org/pool/updates/main/b/bind9/dnsutils_9.2.4-1sarge2_i386.deb
http://security.debian.org/pool/updates/main/b/bind9/libbind-dev_9.2.4-1sarge2_i386.deb
http://security.debian.org/pool/updates/main/b/bind9/libdns16_9.2.4-1sarge2_i386.deb
http://security.debian.org/pool/updates/main/b/bind9/libisc7_9.2.4-1sarge2_i386.deb
http://security.debian.org/pool/updates/main/b/bind9/libisccc0_9.2.4-1sarge2_i386.deb
http://security.debian.org/pool/updates/main/b/bind9/libisccfg0_9.2.4-1sarge2_i386.deb
http://security.debian.org/pool/updates/main/b/bind9/liblwres1_9.2.4-1sarge2_i386.deb
http://security.debian.org/pool/updates/main/b/bind9/lwresd_9.2.4-1sarge2_i386.deb
Intel IA-64
http://security.debian.org/pool/updates/main/b/bind9/bind9_9.2.4-1sarge2_ia64.deb
http://security.debian.org/pool/updates/main/b/bind9/bind9-host_9.2.4-1sarge2_ia64.deb
http://security.debian.org/pool/updates/main/b/bind9/dnsutils_9.2.4-1sarge2_ia64.deb
http://security.debian.org/pool/updates/main/b/bind9/libbind-dev_9.2.4-1sarge2_ia64.deb
http://security.debian.org/pool/updates/main/b/bind9/libdns16_9.2.4-1sarge2_ia64.deb
http://security.debian.org/pool/updates/main/b/bind9/libisc7_9.2.4-1sarge2_ia64.deb
http://security.debian.org/pool/updates/main/b/bind9/libisccc0_9.2.4-1sarge2_ia64.deb
http://security.debian.org/pool/updates/main/b/bind9/libisccfg0_9.2.4-1sarge2_ia64.deb
http://security.debian.org/pool/updates/main/b/bind9/liblwres1_9.2.4-1sarge2_ia64.deb
http://security.debian.org/pool/updates/main/b/bind9/lwresd_9.2.4-1sarge2_ia64.deb
Motorola 680x0
http://security.debian.org/pool/updates/main/b/bind9/bind9_9.2.4-1sarge2_m68k.deb
http://security.debian.org/pool/updates/main/b/bind9/bind9-host_9.2.4-1sarge2_m68k.deb
http://security.debian.org/pool/updates/main/b/bind9/dnsutils_9.2.4-1sarge2_m68k.deb
http://security.debian.org/pool/updates/main/b/bind9/libbind-dev_9.2.4-1sarge2_m68k.deb
http://security.debian.org/pool/updates/main/b/bind9/libdns16_9.2.4-1sarge2_m68k.deb
http://security.debian.org/pool/updates/main/b/bind9/libisc7_9.2.4-1sarge2_m68k.deb
http://security.debian.org/pool/updates/main/b/bind9/libisccc0_9.2.4-1sarge2_m68k.deb
http://security.debian.org/pool/updates/main/b/bind9/libisccfg0_9.2.4-1sarge2_m68k.deb
http://security.debian.org/pool/updates/main/b/bind9/liblwres1_9.2.4-1sarge2_m68k.deb
http://security.debian.org/pool/updates/main/b/bind9/lwresd_9.2.4-1sarge2_m68k.deb
Big endian MIPS
http://security.debian.org/pool/updates/main/b/bind9/bind9_9.2.4-1sarge2_mips.deb
http://security.debian.org/pool/updates/main/b/bind9/bind9-host_9.2.4-1sarge2_mips.deb
http://security.debian.org/pool/updates/main/b/bind9/dnsutils_9.2.4-1sarge2_mips.deb
http://security.debian.org/pool/updates/main/b/bind9/libbind-dev_9.2.4-1sarge2_mips.deb
http://security.debian.org/pool/updates/main/b/bind9/libdns16_9.2.4-1sarge2_mips.deb
http://security.debian.org/pool/updates/main/b/bind9/libisc7_9.2.4-1sarge2_mips.deb
http://security.debian.org/pool/updates/main/b/bind9/libisccc0_9.2.4-1sarge2_mips.deb
http://security.debian.org/pool/updates/main/b/bind9/libisccfg0_9.2.4-1sarge2_mips.deb
http://security.debian.org/pool/updates/main/b/bind9/liblwres1_9.2.4-1sarge2_mips.deb
http://security.debian.org/pool/updates/main/b/bind9/lwresd_9.2.4-1sarge2_mips.deb
Little endian MIPS
http://security.debian.org/pool/updates/main/b/bind9/bind9_9.2.4-1sarge2_mipsel.deb
http://security.debian.org/pool/updates/main/b/bind9/bind9-host_9.2.4-1sarge2_mipsel.deb
http://security.debian.org/pool/updates/main/b/bind9/dnsutils_9.2.4-1sarge2_mipsel.deb
http://security.debian.org/pool/updates/main/b/bind9/libbind-dev_9.2.4-1sarge2_mipsel.deb
http://security.debian.org/pool/updates/main/b/bind9/libdns16_9.2.4-1sarge2_mipsel.deb
http://security.debian.org/pool/updates/main/b/bind9/libisc7_9.2.4-1sarge2_mipsel.deb
http://security.debian.org/pool/updates/main/b/bind9/libisccc0_9.2.4-1sarge2_mipsel.deb
http://security.debian.org/pool/updates/main/b/bind9/libisccfg0_9.2.4-1sarge2_mipsel.deb
http://security.debian.org/pool/updates/main/b/bind9/liblwres1_9.2.4-1sarge2_mipsel.deb
http://security.debian.org/pool/updates/main/b/bind9/lwresd_9.2.4-1sarge2_mipsel.deb
PowerPC
http://security.debian.org/pool/updates/main/b/bind9/bind9_9.2.4-1sarge2_powerpc.deb
http://security.debian.org/pool/updates/main/b/bind9/bind9-host_9.2.4-1sarge2_powerpc.deb
http://security.debian.org/pool/updates/main/b/bind9/dnsutils_9.2.4-1sarge2_powerpc.deb
http://security.debian.org/pool/updates/main/b/bind9/libbind-dev_9.2.4-1sarge2_powerpc.deb
http://security.debian.org/pool/updates/main/b/bind9/libdns16_9.2.4-1sarge2_powerpc.deb
http://security.debian.org/pool/updates/main/b/bind9/libisc7_9.2.4-1sarge2_powerpc.deb
http://security.debian.org/pool/updates/main/b/bind9/libisccc0_9.2.4-1sarge2_powerpc.deb
http://security.debian.org/pool/updates/main/b/bind9/libisccfg0_9.2.4-1sarge2_powerpc.deb
http://security.debian.org/pool/updates/main/b/bind9/liblwres1_9.2.4-1sarge2_powerpc.deb
http://security.debian.org/pool/updates/main/b/bind9/lwresd_9.2.4-1sarge2_powerpc.deb
IBM S/390
http://security.debian.org/pool/updates/main/b/bind9/bind9_9.2.4-1sarge2_s390.deb
http://security.debian.org/pool/updates/main/b/bind9/bind9-host_9.2.4-1sarge2_s390.deb
http://security.debian.org/pool/updates/main/b/bind9/dnsutils_9.2.4-1sarge2_s390.deb
http://security.debian.org/pool/updates/main/b/bind9/libbind-dev_9.2.4-1sarge2_s390.deb
http://security.debian.org/pool/updates/main/b/bind9/libdns16_9.2.4-1sarge2_s390.deb
http://security.debian.org/pool/updates/main/b/bind9/libisc7_9.2.4-1sarge2_s390.deb
http://security.debian.org/pool/updates/main/b/bind9/libisccc0_9.2.4-1sarge2_s390.deb
http://security.debian.org/pool/updates/main/b/bind9/libisccfg0_9.2.4-1sarge2_s390.deb
http://security.debian.org/pool/updates/main/b/bind9/liblwres1_9.2.4-1sarge2_s390.deb
http://security.debian.org/pool/updates/main/b/bind9/lwresd_9.2.4-1sarge2_s390.deb
Sun Sparc
http://security.debian.org/pool/updates/main/b/bind9/bind9_9.2.4-1sarge2_sparc.deb
http://security.debian.org/pool/updates/main/b/bind9/bind9-host_9.2.4-1sarge2_sparc.deb
http://security.debian.org/pool/updates/main/b/bind9/dnsutils_9.2.4-1sarge2_sparc.deb
http://security.debian.org/pool/updates/main/b/bind9/libbind-dev_9.2.4-1sarge2_sparc.deb
http://security.debian.org/pool/updates/main/b/bind9/libdns16_9.2.4-1sarge2_sparc.deb
http://security.debian.org/pool/updates/main/b/bind9/libisc7_9.2.4-1sarge2_sparc.deb
http://security.debian.org/pool/updates/main/b/bind9/libisccc0_9.2.4-1sarge2_sparc.deb
http://security.debian.org/pool/updates/main/b/bind9/libisccfg0_9.2.4-1sarge2_sparc.deb
http://security.debian.org/pool/updates/main/b/bind9/liblwres1_9.2.4-1sarge2_sparc.deb
http://security.debian.org/pool/updates/main/b/bind9/lwresd_9.2.4-1sarge2_sparc.deb

Mandriva

Corporate Server 3.0
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/i586/bind-9.2.3-6.3.C30mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/i586/bind-devel-9.2.3-6.3.C30mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/i586/bind-utils-9.2.3-6.3.C30mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/bind-9.2.3-6.3.C30mdk.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/x86_64/bind-9.2.3-6.3.C30mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/x86_64/bind-devel-9.2.3-6.3.C30mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/x86_64/bind-utils-9.2.3-6.3.C30mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/bind-9.2.3-6.3.C30mdk.src.rpm

Multi Network Firewall 2.0
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf/2.0/i586/bind-9.2.3-6.3.M20mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf/2.0/i586/bind-devel-9.2.3-6.3.M20mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf/2.0/i586/bind-utils-9.2.3-6.3.M20mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf/2.0/SRPMS/bind-9.2.3-6.3.M20mdk.src.rpm

Mandriva Linux 2006
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/i586/bind-9.3.1-4.3.20060mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/i586/bind-devel-9.3.1-4.3.20060mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/i586/bind-utils-9.3.1-4.3.20060mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/SRPMS/bind-9.3.1-4.3.20060mdk.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/x86_64/bind-9.3.1-4.3.20060mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/x86_64/bind-devel-9.3.1-4.3.20060mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/x86_64/bind-utils-9.3.1-4.3.20060mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/SRPMS/bind-9.3.1-4.3.20060mdk.src.rpm

Mandriva Linux 2007
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/bind-9.3.2-8.2mdv2007.0.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/bind-devel-9.3.2-8.2mdv2007.0.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/bind-utils-9.3.2-8.2mdv2007.0.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/SRPMS/bind-9.3.2-8.2mdv2007.0.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/bind-9.3.2-8.2mdv2007.0.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/bind-devel-9.3.2-8.2mdv2007.0.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/bind-utils-9.3.2-8.2mdv2007.0.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/SRPMS/bind-9.3.2-8.2mdv2007.0.src.rpm

Corporate Server 4.0
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/i586/bind-9.3.2-7.2.20060mlcs4.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/i586/bind-devel-9.3.2-7.2.20060mlcs4.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/i586/bind-utils-9.3.2-7.2.20060mlcs4.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/SRPMS/bind-9.3.2-7.2.20060mlcs4.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/x86_64/bind-9.3.2-7.2.20060mlcs4.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/x86_64/bind-devel-9.3.2-7.2.20060mlcs4.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/x86_64/bind-utils-9.3.2-7.2.20060mlcs4.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/SRPMS/bind-9.3.2-7.2.20060mlcs4.src.rpm

Suse Linux
Las actualizaciones pueden descargarse mediante YAST o del servidor FTP oficial de Suse Linux

Red Hat (RHSA-2007:0044-3)
Red Hat Desktop (v. 3)
Red Hat Desktop (v. 4)
Red Hat Enterprise Linux AS (v. 2.1)
Red Hat Enterprise Linux AS (v. 3)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux ES (v. 2.1)
Red Hat Enterprise Linux ES (v. 3)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux WS (v. 2.1)
Red Hat Enterprise Linux WS (v. 3)
Red Hat Enterprise Linux WS (v. 4)
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor
https://rhn.redhat.com/

FreeBSD
FreeBSD 5.5, 6.1
http://security.FreeBSD.org/patches/SA-07:02/bind61.patch
http://security.FreeBSD.org/patches/SA-07:02/bind61.patch.asc
FreeBSD 6.2
http://security.FreeBSD.org/patches/SA-07:02/bind62.patch
http://security.FreeBSD.org/patches/SA-07:02/bind62.patch.asc



SGI
Advanced Linux Environment 3 / RPM / Patch 10370
ftp://oss.sgi.com/projects/sgi_propack/download/3/updates/RPMS
Advanced Linux Environment 3 / SRPM / Patch 10370
ftp://oss.sgi.com/projects/sgi_propack/download/3/updates/SRPMS

NetBSD
Actualice desde el CVS, recompile y reinstale el kernel.
ftp://ftp.netbsd.org/pub/NetBSD/NetBSD-current/src/sys/kern/

Red Hat (RHSA-2007:0057-3)
RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
https://rhn.redhat.com/

Apple
Mac OS X (Universal)
http://www.apple.com/support/downloads/securityupdate2007005universal.html
Mac OS X (PPC)
http://www.apple.com/support/downloads/securityupdate2007005ppc.html
Mac OS X (Server)
http://www.apple.com/support/downloads/securityupdate20070051039server.html
Mac OS X (Client)
http://www.apple.com/support/downloads/securityupdate20070051039client.html

Sun(102969)
Solaris 10 / SPARC / patch 119783-02
Solaris 10 / x86 / patch 119784-02
http://sunsolve.sun.com/pub-cgi/show.pl?target=patchpage

VMware (VMSA-2007-0006)
VMware Workstation 6.0.1
VMware Workstation 5.5.5
http://www.vmware.com/download/ws/
http://www.vmware.com/download/ws/ws5.html
VMware Player 2.0.1
VMware Player 1.0.5
http://www.vmware.com/download/server/
VMware Server 1.0.4
http://www.vmware.com/download/server/
VMware ACE 2.0.1
VMware ACE 1.0.4
http://www.vmware.com/download/ace/
VMware ESX 3.0.2 / patches ESX-1001725 ESX-1001731 ESX-1001726 ESX-1001727 ESX-1001728 ESX-1001729 ESX-1001730
VMware ESX 3.0.1 / patches ESX-8258730 ESX-1001213 ESX-1001691 ESX-1001723 ESX-1001214 ESX-1001692 ESX-1001693 ESX-1001694 ESX-8253547 ESX-8567382
VMware ESX 3.0.0 / patches ESX-4809553 ESX-1001204 ESX-1001206 ESX-1001212 ESX-1001205 ESX-1001207 ESX-1001208 ESX-1001209 ESX-1001210 ESX-1001211
VMware ESX 2.5.4 / patch 10
http://www.vmware.com/support/esx25/doc/esx-254-200708-patch.html
VMware ESX 2.5.3 / patch 13
http://www.vmware.com/support/esx25/doc/esx-253-200708-patch.html
VMware ESX 2.1.3 / patch 8
http://www.vmware.com/support/esx21/doc/esx-213-200708-patch.html
VMware ESX 2.0.2 / patch 8
http://www.vmware.com/support/esx2/doc/esx-202-200708-patch.html

Identificadores estándar

Propiedad Valor
CVE CVE-2007-0494
BID 22231

Recursos adicionales

Debian Security Advisory (DSA 1254-1)
http://lists.debian.org/debian-security-announce/debian-security-announce-2007/msg00009.html

Mandriva Security Advisory (MDKSA-2007:030)
http://www.mandriva.com/security/advisories?name=MDKSA-2007:030

SUSE Security Advisory (SUSE-SA:2007:014)
http://www.novell.com/linux/security/advisories/2007_14_bind.html

Red Hat Security Advisory (RHSA-2007:0044-3)
https://rhn.redhat.com/errata/RHSA-2007-0044.html

FreeBSD Security Advisory (FreeBSD-SA-07:02.bind)
http://security.freebsd.org/advisories/FreeBSD-SA-07:02.bind.asc

SGI Security Advisory (20070201-01-P)
ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc

NetBSD Security Advisory (NetBSD-SA2007-003)
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2007-003.txt.asc

Red Hat Security Advisory (RHSA-2007:0057-3)
https://rhn.redhat.com/errata/RHSA-2007-0057.html

Apple Security Update (305530)
http://docs.info.apple.com/article.html?artnum=305530

Sun Alert Notification (102969)
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102969-1

VMware security advisory (VMSA-2007-0006)
http://archives.neohapsis.com/archives/fulldisclosure/2007-09/0356.html

Histórico de versiones

Versión Comentario Fecha
1.0 Aviso emitido 2007-01-30
1.1 Aviso emitido por Mandriva (MDKSA-2007:030) 2007-01-31
1.2 Aviso emitido por Suse (SUSE-SA:2007:014) 2007-02-05
1.3 Aviso emitido por Red Hat (RHSA-2007:0044-3) 2007-02-07
1.4 Aviso emitido por FreeBSD (FreeBSD-SA-07:02.bind) 2007-02-19
1.5 Aviso emitido por SGI (20070201-01-P) 2007-03-02
1.6 Aviso emitido por NetBSD (NetBSD-SA2007-003) 2007-03-13
1.7 Aviso emitido por Red Hat (RHSA-2007:0057-3) 2007-03-20
1.8 Aviso actualizado por FreeBSD (FreeBSD-SA-07:02.bind) 2007-05-17
1.9 Aviso emitido por Apple (305530) 2007-05-29
1.10 Aviso emitido por Sun (102969) 2007-06-19
1.11 Aviso emitido por VMware (VMSA-2007-0006) 2007-09-25

Miembros de

Ministerio de Defensa
CNI
CCN
CCN-CERT