Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Become a Partner and License Our Database or Notification Service
(IBM Issues Fix) BIND Generates Predictable Query IDs That May Facilitate Cache Poisoning Attacks
SecurityTracker Alert ID: 1018593|
SecurityTracker URL: http://securitytracker.com/id/1018593
(Links to External Site)
Date: Aug 21 2007
Modification of system information|
Fix Available: Yes Vendor Confirmed: Yes |
Version(s): 9.0.x, 9.1.x, 9.2.0, 9.2.1, 9.2.2, 9.2.3, 9.2.4, 9.2.5, 9.2.6, 9.2.7, 9.2.8, 9.3.0, 9.3.1, 9.3.2, 9.3.3, 9.3.4, 9.4.0, 9.4.1, 9.5.0a1, 9.5.0a2, 9.5.0a3, 9.5.0a4, 9.5.0a5|
A vulnerability was reported in BIND. A remote user can conduct cache poisoning attacks.|
The system generates query IDs that have a 1 out of 8 chance of being guessed for half of the query IDs. A remote user may be able to exploit this to conduct cache poisoning attacks.
Only outgoing queries are affected.
Amit Klein from Trusteer (www.trusteer.com) discovered this vulnerability.
A remote user can conduct cache poisoning attacks.|
IBM plans to issue the following fixes for AIX.|
For 5.2.0: APAR IZ02218, to be available 10/31/2007
For 5.3.0: APAR IZ02219, to be available 11/27/2007
IBM has issued an interim fix, available at:
Vendor URL: www.isc.org/ (Links to External Site)
This archive entry is a follow-up to the message listed below.|
Source Message Contents
Date: Tue, 21 Aug 2007 15:34:19 -0400|
-----BEGIN PGP SIGNED MESSAGE-----
IBM SECURITY ADVISORY
First Issued: Thu Aug 16 20:31:59 CDT 2007
VULNERABILITY: BIND remote DNS cache poisoning
PLATFORMS: AIX 5.2, 5.3
SOLUTION: Apply the APAR, interim fix or workaround as described
THREAT: DNS cache may be poisoned due to week DNS query IDs.
CERT VU Number: CVE-2007-2926
CVE Number: 252735
Berkeley Internet Name Domain 9 (BIND9) is a Domain Name System (DNS)
distribution from the Internet Systems Consortium (ISC) and it is included
with AIX 5.2 and 5.3. At this time, all versions of AIX 5.2 and 5.3 include
The ISC has issued a patch for a security vulnerability in some versions of
BIND 9 that can be exploited by a remote attacker to guess the DNS query
IDs and poison the DNS cache.
For more details please visit:
From the ISC BIND advisory:
The DNS query id generation is vulnerable to cryptographic analysis
which provides a 1 in 8 chance of guessing the next query id for 50% of
the query ids. This can be used to perform cache poisoning by an
This bug only affects outgoing queries, generated by BIND 9 to answer
questions as a resolver, or when it is looking up data for internal
uses, such as when sending NOTIFYs to slave name servers.
IV. PLATFORM VULNERABILITY ASSESSMENT
To determine if your system is vulnerable, run the following command:
# lslpp -l | grep bos.net.tcp.server
# lslpp -l | grep bos.net.tcp.client
The following filesets are vulnerable:
AIX Level Fileset Lower Level Upper Level
5.2.0 bos.net.tcp.server 220.127.116.11 18.104.22.168
5.2.0 bos.net.tcp.client 22.214.171.124 126.96.36.199
5.3.0 bos.net.tcp.server 188.8.131.52 184.108.40.206
5.3.0 bos.net.tcp.client 220.127.116.11 18.104.22.168
NOTE: The above filesets are those currently supported by IBM. Previous
versions of the fileset may also be vulnerable. Affected customers are
urged to upgrade to the latest applicable Technology Level and Service
IBM provides the following fixes:
AIX Level APAR number Availability
5.2.0 IZ02218 10/31/2007 (subject to change)
5.3.0 IZ02219 11/27/2007 (subject to change)
AIX Version 5 APARs can be downloaded from:
NOTE: Affected customers are urged to upgrade to the latest applicable
Technology Level and Service Pack.
B. INTERIM FIXES
Interim fixes are available. The interim fix can be downloaded via
This is a compressed tarball containing this advisory, interim fix
packages and PGP signatures for each package. The interim fixes below
include prerequisite checking. This will enforce the correct mapping
between the fixes and AIX Technology Levels.
AIX Release & Technology Level Interim fix
IMPORTANT: If possible, it is recommended that a mksysb backup of the
system be created. Verify it is both bootable and readable before
These interim fixes have not been fully regression tested; thus, IBM
does not warrant the fully correct functionality of the interim fix.
Customers install the interim fix and operate the modified version of
AIX at their own risk.
Verify you have retrieved the fixes intact:
The interim fixes below are named by using the technology level
corresponding to the release that the fix applies to. The checksums
below were generated using the "sum" and "md5sum" commands and are as
Filename sum md5sum
IZ02218_08.070814.epkg.Z 40008 3296 5bf5384341dc7e00e0cc378e3144ae8b
IZ02218_09.070814.epkg.Z 26768 3291 e0e6ea57ff375715ed5cedd3238b8317
IZ02218_10.070810.epkg.Z 39720 3293 9528b87acaddfd83f7351eca2d946fb7
IZ02219_04.070814.epkg.Z 08276 3214 eb1326b75f19ac84eae237882044beb8
IZ02219_05.070814.epkg.Z 44939 3220 edaa7f8e167cbe3f5ca14040d648e1a9
IZ02219_06.070810.epkg.Z 29152 3228 886a25c351f61e2f1f1fa994bd780da3
These sums should match exactly. The PGP signatures in the
compressed tarball and on this advisory can also be used to verify
the integrity of the various files they correspond to. If the sums
or signatures cannot be confirmed, double check the command results
and the download site address. If those are OK, contact IBM AIX
Security at email@example.com and describe the
C. INTERIM FIX INSTALLATION
These packages use the new Interim Fix Management Solution to install
and manage interim fixes. More information can be found at:
To preview an epkg interim fix installation execute the following
# emgr -e ipkg_name -p # where ipkg_name is the name of the
# interim fix package being previewed.
To install an epkg interim fix package, execute the following command:
# emgr -e ipkg_name -X # where ipkg_name is the name of the
# interim fix package being installed.
The "X" flag will expand any filesystems if required.
If you are running BIND9 there are no known workarounds. If the service
is not needed and is running, shut it down.
VII. OBTAINING FIXES
AIX Version 5 APARs can be downloaded from:
Security related Interim Fixes can be downloaded from:
VII. CONTACT INFORMATION
If you would like to receive AIX Security Advisories via email, please
Comments regarding the content of this announcement can be directed to:
To request the PGP public key that can be used to communicate
securely with the AIX Security Team send email to
firstname.lastname@example.org with a subject of "get key". The key
can also be downloaded from a PGP Public Key Server. The key id is
Please contact your local IBM AIX support center for any assistance.
eServer is a trademark of International Business Machines Corporation.
IBM, AIX and pSeries are registered trademarks of International Business
Machines Corporation. All other trademarks are property of their
This vulnerability was reported by ISC who credit Amit Klein from Trusteer
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (AIX)
-----END PGP SIGNATURE-----
Go to the Top of This SecurityTracker Archive Page