=========================================================================Ubuntu Security Notice USN-1910-1
July 29, 2013

bind9 vulnerability
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 13.04
- Ubuntu 12.10
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS

Summary:

Bind could be made to crash if it received specially crafted network
traffic.

Software Description:
- bind9: Internet Domain Name Server

Details:

Maxim Shudrak discovered that Bind incorrectly handled certain malformed
rdata. A remote attacker could use this flaw with a specially crafted
query to cause Bind to stop responding, resulting in a denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 13.04:
  bind9                           1:9.9.2.dfsg.P1-2ubuntu2.1
  libdns95                        1:9.9.2.dfsg.P1-2ubuntu2.1

Ubuntu 12.10:
  bind9                           1:9.8.1.dfsg.P1-4.2ubuntu3.3
  libdns81                        1:9.8.1.dfsg.P1-4.2ubuntu3.3

Ubuntu 12.04 LTS:
  bind9                           1:9.8.1.dfsg.P1-4ubuntu0.7
  libdns81                        1:9.8.1.dfsg.P1-4ubuntu0.7

Ubuntu 10.04 LTS:
  bind9                           1:9.7.0.dfsg.P1-1ubuntu0.10
  libdns64                        1:9.7.0.dfsg.P1-1ubuntu0.10

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-1910-1
  CVE-2013-4854

Package Information:
  https://launchpad.net/ubuntu/+source/bind9/1:9.9.2.dfsg.P1-2ubuntu2.1
  https://launchpad.net/ubuntu/+source/bind9/1:9.8.1.dfsg.P1-4.2ubuntu3.3
  https://launchpad.net/ubuntu/+source/bind9/1:9.8.1.dfsg.P1-4ubuntu0.7
  https://launchpad.net/ubuntu/+source/bind9/1:9.7.0.dfsg.P1-1ubuntu0.10


Ubuntu 1910-1: Bind vulnerability

July 29, 2013
Bind could be made to crash if it received specially crafted network traffic.

Summary

Update Instructions

The problem can be corrected by updating your system to the following package versions: Ubuntu 13.04: bind9 1:9.9.2.dfsg.P1-2ubuntu2.1 libdns95 1:9.9.2.dfsg.P1-2ubuntu2.1 Ubuntu 12.10: bind9 1:9.8.1.dfsg.P1-4.2ubuntu3.3 libdns81 1:9.8.1.dfsg.P1-4.2ubuntu3.3 Ubuntu 12.04 LTS: bind9 1:9.8.1.dfsg.P1-4ubuntu0.7 libdns81 1:9.8.1.dfsg.P1-4ubuntu0.7 Ubuntu 10.04 LTS: bind9 1:9.7.0.dfsg.P1-1ubuntu0.10 libdns64 1:9.7.0.dfsg.P1-1ubuntu0.10 In general, a standard system update will make all the necessary changes.

References

https://ubuntu.com/security/notices/USN-1910-1

CVE-2013-4854

Severity
July 29, 2013

Package Information

https://launchpad.net/ubuntu/+source/bind9/1:9.9.2.dfsg.P1-2ubuntu2.1 https://launchpad.net/ubuntu/+source/bind9/1:9.8.1.dfsg.P1-4.2ubuntu3.3 https://launchpad.net/ubuntu/+source/bind9/1:9.8.1.dfsg.P1-4ubuntu0.7 https://launchpad.net/ubuntu/+source/bind9/1:9.7.0.dfsg.P1-1ubuntu0.10

Related News