SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   BIND Vendors:   ISC (Internet Software Consortium)
BIND Memory Deference Bug Lets Remote Users Crash the Name Server
SecurityTracker Alert ID:  1017561
SecurityTracker URL:  http://securitytracker.com/id/1017561
CVE Reference:   CVE-2007-0493   (Links to External Site)
Updated:  Jan 31 2007
Original Entry Date:  Jan 25 2007
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 9.3.0 - 9.3.3, 9.4.x prior to 9.4.0rc2
Description:   A vulnerability was reported in BIND. A remote user can cause denial of service conditions.

A remote user can send specially crafted data to cause the target 'named' service to dereference a freed fetch context and potentially crash.

The following versions are affected:

BIND 9.3.0, 9.3.1, 9.3.2, 9.3.3
BIND 9.4.0a1, 9.4.0a2, 9.4.0a3, 9.4.0a4, 9.4.0a5, 9.4.0a6, 9.4.0b1, 9.4.0b2, 9.4.0b3, 9.4.0b4, 9.4.0rc1
BIND 9.5.0a1 (Bind Forum only)

Impact:   A remote user can cause the target name service to crash.
Solution:   The vendor has issued fixed versions (9.2.8, 9.3.4, and 9.4.0rc2).

The fix will be included in the upcoming BIND 9.5.0a2 release.

Vendor URL:  www.isc.org/ (Links to External Site)
Cause:   State error
Underlying OS:   Linux (Any), UNIX (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Feb 12 2007 (FreeBSD Issues Fix) BIND Memory Deference Bug Lets Remote Users Crash the Name Server   (FreeBSD Security Advisories <security-advisories@freebsd.org>)
FreeBSD has released a fix for named(8).
Mar 9 2007 (NetBSD Issues Fix) BIND Memory Deference Bug Lets Remote Users Crash the Name Server   (NetBSD Security-Officer <security-officer@NetBSD.org>)
NetBSD has released a fix.
Mar 14 2007 (Red Hat Issues Fix) BIND Memory Deference Bug Lets Remote Users Crash the Name Server   (bugzilla@redhat.com)
Red Hat has released a fix for Red Hat Enterprise Linux 5.
Apr 16 2007 (HP Issues Fix for Tru64 UNIX) BIND Memory Deference Bug Lets Remote Users Crash the Name Server
HP has issued a fix for HP Tru64 UNXI 4.0F PK8, 4.0G PK4, 5.1A PK6, 5.1B-3, and 5.1B-4.
May 24 2007 (Apple Issues Fix) BIND Memory Deference Bug Lets Remote Users Crash the Name Server   (Apple Product Security <product-security-noreply@lists.apple.com>)
Apple has released a fix for Mac OS X.
Jun 12 2007 (HP Issues Fix for HP-UX) BIND Memory Deference Bug Lets Remote Users Crash the Name Server
HP has issued a fix for BIND on HP-UX 11.11 and 11.23.



 Source Message Contents

Date:  2007-01-25 0:23:26
Subject:  Internet Systems Consortium Security Advisory.


                Internet Systems Consortium Security Advisory.
		   BIND 9: dereferencing freed fetch context
                             12 January 2007

Versions affected:

	BIND 9.3.0, 9.3.1, 9.3.2, 9.3.3
        BIND 9.4.0a1, 9.4.0a2, 9.4.0a3, 9.4.0a4, 9.4.0a5, 9.4.0a6, 9.4.0b1
	     9.4.0b2, 9.4.0b3, 9.4.0b4, 9.4.0rc1 
	BIND 9.5.0a1 (Bind Forum only)

Severity: Low
Exploitable: Remotely

Description:

	It is possible for the named to dereference (read) a freed
	fetch context.  This can cause named to exit unintentionally.

Workaround:

	Disable / restrict recursion (to limit exposure).

Fix:

	Upgrade to BIND 9.2.8, BIND 9.3.4 or BIND 9.4.0rc2.
	Additionally this will be fixed in the upcoming BIND 9.5.0a2.

Revision History:
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC