LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: November 21st, 2014
Linux Security Week: November 17th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Redhat: 'bind' update Print E-mail
User Rating:      How can I rate this item?
Posted by LinuxSecurity.com Team   
RedHat Linux A bug in bind 8.2.2_P5 allows for a denial of service attack.

---------------------------------------------------------------------
                   Red Hat, Inc. Security Advisory

Synopsis:          Updated bind packages fixing DoS attack available
Advisory ID:       RHSA-2000:107-04
Issue date:        2000-11-11
Updated on:        2000-11-27
Product:           Red Hat Linux
Keywords:          bind DoS denial of service attack exploit security
Cross references:  N/A
---------------------------------------------------------------------

1. Topic:

A remote DoS (denial of service) attack is possible with bind versions
prior to 8.2.2_P7.

2000-11-12: Added bind-devel, bind-utils packages to package list.
2000-11-27: Added packages for Red Hat Linux 7 for Alpha

2. Relevant releases/architectures:

Red Hat Linux 5.2 - i386, alpha, sparc
Red Hat Linux 6.0 - i386, alpha, sparc
Red Hat Linux 6.1 - i386, alpha, sparc
Red Hat Linux 6.2 - i386, alpha, sparc
Red Hat Linux 7.0 - i386, alpha

3. Problem description:

A bug in bind 8.2.2_P5 allows for a denial of service attack.

If named is open to zone transfers and recursive resolving, it will crash
after a ZXFR for the authoritative zone and a query of a remote hostname.

4. Solution:

For each RPM for your particular architecture, run:

rpm -Fvh [filename]

where filename is the name of the RPM.

Disabling zone transfers to non-trusted hosts by adding
allow-transfer { trusted-hosts; };
to /etc/named.conf prevents the exploit from working on older releases,
however, this does not fix the problem.

5. Bug IDs fixed  (http://bugzilla.Red Hat.com/bugzilla for more info):

20546 - bind 8.2.2-P5 remote DoS


6. RPMs required:

Red Hat Linux 5.2:

alpha: 
ftp://updates.Red Hat.com/5.2/alpha/bind-8.2.2_P7-0.5.2.alpha.rpm 
ftp://updates.Red Hat.com/5.2/alpha/bind-devel-8.2.2_P7-0.5.2.alpha.rpm 
ftp://updates.Red Hat.com/5.2/alpha/bind-utils-8.2.2_P7-0.5.2.alpha.rpm

sparc: 
ftp://updates.Red Hat.com/5.2/sparc/bind-8.2.2_P7-0.5.2.sparc.rpm 
ftp://updates.Red Hat.com/5.2/sparc/bind-devel-8.2.2_P7-0.5.2.sparc.rpm 
ftp://updates.Red Hat.com/5.2/sparc/bind-utils-8.2.2_P7-0.5.2.sparc.rpm

i386: 
ftp://updates.Red Hat.com/5.2/i386/bind-8.2.2_P7-0.5.2.i386.rpm 
ftp://updates.Red Hat.com/5.2/i386/bind-devel-8.2.2_P7-0.5.2.i386.rpm 
ftp://updates.Red Hat.com/5.2/i386/bind-utils-8.2.2_P7-0.5.2.i386.rpm

sources: 
ftp://updates.Red Hat.com/5.2/SRPMS/bind-8.2.2_P7-0.5.2.src.rpm

Red Hat Linux 6.0:

sparc: 
ftp://updates.Red Hat.com/6.0/sparc/bind-8.2.2_P7-0.6.2.sparc.rpm 
ftp://updates.Red Hat.com/6.0/sparc/bind-devel-8.2.2_P7-0.6.2.sparc.rpm 
ftp://updates.Red Hat.com/6.0/sparc/bind-utils-8.2.2_P7-0.6.2.sparc.rpm

i386: 
ftp://updates.Red Hat.com/6.0/i386/bind-8.2.2_P7-0.6.2.i386.rpm 
ftp://updates.Red Hat.com/6.0/i386/bind-devel-8.2.2_P7-0.6.2.i386.rpm 
ftp://updates.Red Hat.com/6.0/i386/bind-utils-8.2.2_P7-0.6.2.i386.rpm

alpha: 
ftp://updates.Red Hat.com/6.0/alpha/bind-8.2.2_P7-0.6.2.alpha.rpm 
ftp://updates.Red Hat.com/6.0/alpha/bind-devel-8.2.2_P7-0.6.2.alpha.rpm 
ftp://updates.Red Hat.com/6.0/alpha/bind-utils-8.2.2_P7-0.6.2.alpha.rpm

sources: 
ftp://updates.Red Hat.com/6.0/SRPMS/bind-8.2.2_P7-0.6.2.src.rpm

Red Hat Linux 6.1:

alpha: 
ftp://updates.Red Hat.com/6.1/alpha/bind-8.2.2_P7-0.6.2.alpha.rpm 
ftp://updates.Red Hat.com/6.1/alpha/bind-devel-8.2.2_P7-0.6.2.alpha.rpm 
ftp://updates.Red Hat.com/6.1/alpha/bind-utils-8.2.2_P7-0.6.2.alpha.rpm

sparc: 
ftp://updates.Red Hat.com/6.1/sparc/bind-8.2.2_P7-0.6.2.sparc.rpm 
ftp://updates.Red Hat.com/6.1/sparc/bind-devel-8.2.2_P7-0.6.2.sparc.rpm 
ftp://updates.Red Hat.com/6.1/sparc/bind-utils-8.2.2_P7-0.6.2.sparc.rpm

i386: 
ftp://updates.Red Hat.com/6.1/i386/bind-8.2.2_P7-0.6.2.i386.rpm 
ftp://updates.Red Hat.com/6.1/i386/bind-devel-8.2.2_P7-0.6.2.i386.rpm 
ftp://updates.Red Hat.com/6.1/i386/bind-utils-8.2.2_P7-0.6.2.i386.rpm

sources: 
ftp://updates.Red Hat.com/6.1/SRPMS/bind-8.2.2_P7-0.6.2.src.rpm

Red Hat Linux 6.2:

alpha: 
ftp://updates.Red Hat.com/6.2/alpha/bind-8.2.2_P7-0.6.2.alpha.rpm 
ftp://updates.Red Hat.com/6.2/alpha/bind-devel-8.2.2_P7-0.6.2.alpha.rpm 
ftp://updates.Red Hat.com/6.2/alpha/bind-utils-8.2.2_P7-0.6.2.alpha.rpm

sparc: 
ftp://updates.Red Hat.com/6.2/sparc/bind-8.2.2_P7-0.6.2.sparc.rpm 
ftp://updates.Red Hat.com/6.2/sparc/bind-devel-8.2.2_P7-0.6.2.sparc.rpm 
ftp://updates.Red Hat.com/6.2/sparc/bind-utils-8.2.2_P7-0.6.2.sparc.rpm

i386: 
ftp://updates.Red Hat.com/6.2/i386/bind-8.2.2_P7-0.6.2.i386.rpm 
ftp://updates.Red Hat.com/6.2/i386/bind-devel-8.2.2_P7-0.6.2.i386.rpm 
ftp://updates.Red Hat.com/6.2/i386/bind-utils-8.2.2_P7-0.6.2.i386.rpm

sources: 
ftp://updates.Red Hat.com/6.2/SRPMS/bind-8.2.2_P7-0.6.2.src.rpm

Red Hat Linux 7.0:

alpha: 
ftp://updates.Red Hat.com/7.0/alpha/bind-8.2.2_P7-2.alpha.rpm 
ftp://updates.Red Hat.com/7.0/alpha/bind-devel-8.2.2_P7-2.alpha.rpm 
ftp://updates.Red Hat.com/7.0/alpha/bind-utils-8.2.2_P7-2.alpha.rpm

i386: 
ftp://updates.Red Hat.com/7.0/i386/bind-8.2.2_P7-1.i386.rpm 
ftp://updates.Red Hat.com/7.0/i386/bind-devel-8.2.2_P7-1.i386.rpm 
ftp://updates.Red Hat.com/7.0/i386/bind-utils-8.2.2_P7-1.i386.rpm

sources: 
ftp://updates.Red Hat.com/7.0/SRPMS/bind-8.2.2_P7-1.src.rpm 
ftp://updates.Red Hat.com/7.0/SRPMS/bind-8.2.2_P7-2.src.rpm

7. Verification:


MD5 sum                           Package Name
--------------------------------------------------------------------------
a8384e027a701ac18c222e8cf692d1bb  5.2/SRPMS/bind-8.2.2_P7-0.5.2.src.rpm
1a9d82ed254a4316000b0951870b7a1a  5.2/alpha/bind-8.2.2_P7-0.5.2.alpha.rpm
7fd21b8d27d13dd83297abd1b607030f  5.2/alpha/bind-devel-8.2.2_P7-0.5.2.alpha.rpm
fc75f73bc341839b01b9191c2735babd  5.2/alpha/bind-utils-8.2.2_P7-0.5.2.alpha.rpm
6fdd9dc50a075d82b457f6a1079cdef6  5.2/i386/bind-8.2.2_P7-0.5.2.i386.rpm
1084f39bc01bf97588c19a1f61fa8685  5.2/i386/bind-devel-8.2.2_P7-0.5.2.i386.rpm
016fbd1f68b9fdfcab4ada341c4f4623  5.2/i386/bind-utils-8.2.2_P7-0.5.2.i386.rpm
92801fa17e15665fab7ea18b9623ecd7  5.2/sparc/bind-8.2.2_P7-0.5.2.sparc.rpm
792eb5a0fc0ca87eac53dbfc103974e5  5.2/sparc/bind-devel-8.2.2_P7-0.5.2.sparc.rpm
bff05c21bca820793f5bab316b8415c6  5.2/sparc/bind-utils-8.2.2_P7-0.5.2.sparc.rpm
c663e471d722b6d59d147233c96466f9  6.0/SRPMS/bind-8.2.2_P7-0.6.2.src.rpm
95c9a4aa98c5278195df5853ea0f8371  6.0/alpha/bind-8.2.2_P7-0.6.2.alpha.rpm
59cdef039c4f88b565dcf4270be63403  6.0/alpha/bind-devel-8.2.2_P7-0.6.2.alpha.rpm
b4615fd210c1c6dd11679d53e8b5a8a8  6.0/alpha/bind-utils-8.2.2_P7-0.6.2.alpha.rpm
a6dc64455c83374894d1ac149d27f9ba  6.0/i386/bind-8.2.2_P7-0.6.2.i386.rpm
a0a66cba7a41dc0749bef145b8c76ffd  6.0/i386/bind-devel-8.2.2_P7-0.6.2.i386.rpm
fae686fc3216eb767895a93601d69853  6.0/i386/bind-utils-8.2.2_P7-0.6.2.i386.rpm
29baa5949e4f67089e434148a4d1bf8c  6.0/sparc/bind-8.2.2_P7-0.6.2.sparc.rpm
6f24075c04e8f00f8f802df8767cc0b8  6.0/sparc/bind-devel-8.2.2_P7-0.6.2.sparc.rpm
05590e20ba01a0f465a9df8234a7aace  6.0/sparc/bind-utils-8.2.2_P7-0.6.2.sparc.rpm
c663e471d722b6d59d147233c96466f9  6.1/SRPMS/bind-8.2.2_P7-0.6.2.src.rpm
95c9a4aa98c5278195df5853ea0f8371  6.1/alpha/bind-8.2.2_P7-0.6.2.alpha.rpm
59cdef039c4f88b565dcf4270be63403  6.1/alpha/bind-devel-8.2.2_P7-0.6.2.alpha.rpm
b4615fd210c1c6dd11679d53e8b5a8a8  6.1/alpha/bind-utils-8.2.2_P7-0.6.2.alpha.rpm
a6dc64455c83374894d1ac149d27f9ba  6.1/i386/bind-8.2.2_P7-0.6.2.i386.rpm
a0a66cba7a41dc0749bef145b8c76ffd  6.1/i386/bind-devel-8.2.2_P7-0.6.2.i386.rpm
fae686fc3216eb767895a93601d69853  6.1/i386/bind-utils-8.2.2_P7-0.6.2.i386.rpm
29baa5949e4f67089e434148a4d1bf8c  6.1/sparc/bind-8.2.2_P7-0.6.2.sparc.rpm
6f24075c04e8f00f8f802df8767cc0b8  6.1/sparc/bind-devel-8.2.2_P7-0.6.2.sparc.rpm
05590e20ba01a0f465a9df8234a7aace  6.1/sparc/bind-utils-8.2.2_P7-0.6.2.sparc.rpm
c663e471d722b6d59d147233c96466f9  6.2/SRPMS/bind-8.2.2_P7-0.6.2.src.rpm
95c9a4aa98c5278195df5853ea0f8371  6.2/alpha/bind-8.2.2_P7-0.6.2.alpha.rpm
59cdef039c4f88b565dcf4270be63403  6.2/alpha/bind-devel-8.2.2_P7-0.6.2.alpha.rpm
b4615fd210c1c6dd11679d53e8b5a8a8  6.2/alpha/bind-utils-8.2.2_P7-0.6.2.alpha.rpm
a6dc64455c83374894d1ac149d27f9ba  6.2/i386/bind-8.2.2_P7-0.6.2.i386.rpm
a0a66cba7a41dc0749bef145b8c76ffd  6.2/i386/bind-devel-8.2.2_P7-0.6.2.i386.rpm
fae686fc3216eb767895a93601d69853  6.2/i386/bind-utils-8.2.2_P7-0.6.2.i386.rpm
29baa5949e4f67089e434148a4d1bf8c  6.2/sparc/bind-8.2.2_P7-0.6.2.sparc.rpm
6f24075c04e8f00f8f802df8767cc0b8  6.2/sparc/bind-devel-8.2.2_P7-0.6.2.sparc.rpm
05590e20ba01a0f465a9df8234a7aace  6.2/sparc/bind-utils-8.2.2_P7-0.6.2.sparc.rpm
9db3ab376d44984cf200a486c15fb267  7.0/SRPMS/bind-8.2.2_P7-1.src.rpm
89a2dd1030505115619d8c4a40e7add5  7.0/SRPMS/bind-8.2.2_P7-2.src.rpm
db718ef4f38c5fd572ca5c0e3dc9d079  7.0/alpha/bind-8.2.2_P7-2.alpha.rpm
da5747f5b31e563ec0d2a26a15fcf20d  7.0/alpha/bind-devel-8.2.2_P7-2.alpha.rpm
b41501bb5a54db1876c045b9157bb7fd  7.0/alpha/bind-utils-8.2.2_P7-2.alpha.rpm
3ca7a0db5c91992478737bf7564ad148  7.0/i386/bind-8.2.2_P7-1.i386.rpm
2846b6dcd911cc6e3cc0c4ba3c3c3af2  7.0/i386/bind-devel-8.2.2_P7-1.i386.rpm
74e8f7ff624f8df88592265cbfba124b  7.0/i386/bind-utils-8.2.2_P7-1.i386.rpm

These packages are GPG signed by Red Hat, Inc. for security.  Our key
is available at:
     http://www.Red Hat.com/corp/contact.html

You can verify each package with the following command:
    rpm --checksig  

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    rpm --checksig --nogpg 

8. References:
 
http://bugzilla.Red Hat.com/bugzilla/show_bug.cgi?id=20546


Copyright(c) 2000 Red Hat, Inc.
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Google Releases Open Source Tool for Testing Web App Security Scanners
Most Targeted Attacks Exploit Privileged Accounts
NotCompable sets new standards for mobile botnet sophistication
Hands on with Caine Linux: Pentesting and UEFI compatible
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.