[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

PISA-18-NOV-99-001



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

              .------------------------------------------------.
              |**** Project Independence Security Advisory ****|
              `-----------* ID: PISA-18-NOV-99-001 *-----------'
               Issued by: David Webster <cognition@bigfoot.com>

Issue Date: 18-NOV-99

Overview: Security problems in bind

Affected: Independence Release 6.0-0.8 (Redhat 6.0)

References: RedHat Security Advisory; RHSA-1999:054-01
	    http://www.isc.org/products/BIND/bind-security-19991108.html

                                  -=-=-==-=-=-

Detailed Problem Description:

	Various vulnerabilities exist in previous versions of
	bind:

	- A bug in the processing of NXT records can theoretically allow
	  a remote attacker to gain access to the DNS server as the
	  user running bind (by default, root).

	- Several remote denial-of-service attacks are possible; by
	  using abnormal TCP options, causing the DNS server to use many
	  file descriptors, or using special SIG records, it may be possible
	  to crash the DNS server.

	It is recommended that all users of bind upgrade to the latest
	packages.

	Thanks go to ISC for providing the updated packages.

Solution:

	Update the affected RPM packages by downloading and
	installing the RPMs listed below. For each RPM, run:

		root# rpm -Uvh <filename>

	where <filename> is the name of the RPM.

	[Note: You need only install EITHER the compiled RPMs,
	(*.i386.rpm) OR the source RPMs, (*.src.rpm), NOT both.]

RPMs:

  ftp://updates.redhat.com/6.1/i386/bind-8.2.2_P3-1.i386.rpm
  ftp://updates.redhat.com/6.1/i386/bind-devel-8.2.2_P3-1.i386.rpm
  ftp://updates.redhat.com/6.1/i386/bind-utils-8.2.2_P3-1.i386.rpm

Source RPMs:

  ftp://updates.redhat.com/6.1/SRPMS/bind-8.2.2_P3-1.src.rpm

Verification:

MD5 sum                           Package Name
- --------------------------------------------------------------------------
f0c2e341fe81310d3031be7e0d67225f  i386/bind-8.2.2_P3-1.i386.rpm
4f34e526ec52c94b9cd3411892f920df  i386/bind-devel-8.2.2_P3-1.i386.rpm
5cb10493b44f9fe2a9c6667ebe0a0a8f  i386/bind-utils-8.2.2_P3-1.i386.rpm
987d55828aab270e14777a034d029cea  SRPMS/bind-8.2.2_P3-1.src.rpm
- --------------------------------------------------------------------------

These packages are GPG signed by Red Hat, Inc. for security.
Their key is available at: http://www.redhat.com/corp/contact.html

You can verify each package with the following command:
    rpm --checksig  <filename>

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    rpm --checksig --nogpg <filename>

This security advisory, and all future ones should be signed by me,
David Webster (aka cognition), with key ID: 45 FA C2 83

Which is avaliable from: http://www.cognite.net/pgp.html,
			 and most good pgp key servers.

An archive of these messages can be currently be found on:
http://www.cognite.net/indy/

A process of automatic retrival is being worked on.

[Note: these problems were discovered, and fixed by RedHat.]

	.---------------------------------------------------.
	| And problems regarding this, or future advisories |
	| should be emailed to me: <cognition@bigfoot.com>  |
	`---------------------------------------------------'
-----BEGIN PGP SIGNATURE-----
Comment: David Webster (aka cogNiTioN) <http://www.cognite.net/>

iD8DBQE4OXwLDdLNO0X6woMRAlaLAJ4opLkwMDgVkEZfYRztSR40ldoOeQCgtFzI
CJ+PfHBeyjA3JXjO5fp8aBY=
=T4zC
-----END PGP SIGNATURE-----