The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


NetBSD Security Advisory 2002-029: named(8) multiple denial of service and remote execution of code


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: Wed, 20 Nov 2002 02:23:17 +0900
From: NetBSD Security Officer <security-officer@netbsd.org.>
To: [email protected]
Subject: NetBSD Security Advisory 2002-029: named(8) multiple denial of service and remote execution of code

-----BEGIN PGP SIGNED MESSAGE-----


                 NetBSD Security Advisory 2002-029

Topic: named(8) multiple denial of service and remote execution of code Version: NetBSD-current: November 15, 2002 NetBSD 1.6: affected NetBSD-1.5.3: affected NetBSD-1.5.2: affected NetBSD-1.5.1: affected NetBSD-1.5: affected pkgsrc: bind-4.9.10 and prior, bind-8.3.3 and prior Severity: Remote root compromise Fixed: NetBSD-current: November 15, 2002 NetBSD-1.6 branch: November 16, 2002 NetBSD-1.5 branch: November 16, 2002 pkgsrc: bind-4.9.10nb1, bind-8.3.3nb1 Abstract ======== named(8) version 8.3.3, which is shipped with NetBSD, is vulnerable to remote execution of malicious code, and multiple denial of service attacks. Technical Details ================= http://www.isc.org/products/BIND/bind-security.html See the sections named: BIND: Remote Execution of Code" and "BIND: Multiple Denial of Service Solutions and Workarounds
If you are not running named(8), your system is not affected. BIND 9 is not affected by these vulnerabilities. Upgrading to BIND 9 is recommended. BIND 9 is available in the NetBSD Pkgsrc Collection (pkgsrc/net/bind9). onfiguration files differ between BIND 8 and 9. Plan such a migration appropriately. BIND 8 servers with recursion disabled are not vulnerable to the `BIND SIG Cached RR Overflow Vulnerability' nor to the `BIND SIG Expiry Time DoS'. to disable recursion, edit the BIND 8 configuration file (default path /etc/namedb/named.conf) to add `recursion no;' and `fetch-glue no;' to the options statement as shown: options { recursion no; fetch-glue no; /* ... other options ... */ }; The following instructions describe how to upgrade your named binaries by updating your source tree and rebuilding and installing a new version of named. Be sure to restart running instance of named(8) after installation. * NetBSD-current: Systems running NetBSD-current dated from before 2002-11-15 should be upgraded to NetBSD-current dated 2002-11-15 or later. The following directories need to be updated from the netbsd-current CVS branch (aka HEAD): dist/bind usr.sbin/bind To update from CVS, re-build, and re-install named: # cd src # cvs update -d -P dist/bind usr.sbin/bind # cd usr.sbin/bind # make obj dependall # make install * NetBSD 1.6: Systems running NetBSD 1.6 dated from before 2002-11-16 should be upgraded to NetBSD 1.6 dated 2002-11-16 or later. The following directories need to be updated from the netbsd-1-6 CVS branch: dist/bind usr.sbin/bind To update from CVS, re-build, and re-install named: # cd src # cvs update -d -P -r netbsd-1-6 dist/bind usr.sbin/bind # cd usr.sbin/bind # make obj dependall # make install * NetBSD 1.5, 1.5.1, 1.5.2, 1.5.3: Systems running NetBSD 1.5, 1.5.1, 1.5.2 or 1.5.3 dated from before 2002-11-16 should be upgraded to NetBSD 1.5 dated 2002-11-16 or later. The following directories need to be updated from the netbsd-1-5 CVS branch: dist/bind usr.sbin/bind To update from CVS, re-build, and re-install named: # cd src # cvs update -d -P -r netbsd-1-5 dist/bind usr.sbin/bind # cd usr.sbin/bind # make obj dependall # make install * pkgsrc bind-4.9.10 and prior, as well as bind-8.3.3 and prior are vulnerable. Upgrade to bind-4.9.10nb1, or bind-8.3.3nb1 (or later). Thanks To ========= FreeBSD Security-Officer, for portions of the workaround text. Revision History =============== 2002-11-20 Initial release More Information ================ Advisories may be updated as new information becomes available. The most recent version of this advisory (PGP signed) can be found at ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-029.txt.asc Information about NetBSD and NetBSD security can be found at http://www.NetBSD.ORG/ and http://www.NetBSD.ORG/Security/. Copyright 2002, The NetBSD Foundation, Inc. All Rights Reserved. $NetBSD: NetBSD-SA2002-029.txt,v 1.7 2002/11/19 17:09:59 david Exp $ -----BEGIN PGP SIGNATURE----- Version: 2.6.3ia Charset: noconv iQCVAwUBPdpxjj5Ru2/4N2IFAQH26AP/Zn+HG+u0Lwryq/fflxUJLO3Ib3QXZH14 hD/SWfkCExbZmd/5kkDdcMRfe33VTvSqZRw0IRGacErkO8cC8sbUUA9RYxAsxmpG VMVNGMTaYlFDzGKPzyVmt9/4lAPvtR/Rd/bfJSUEfOIygNcQIvCpYN895aAFBWzl gL8QNrRO7LY= =1XM+ -----END PGP SIGNATURE-----

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру