(IBM Issues Fix for AIX) BIND DNSSEC Validation Bug Lets Remote Users Deny Service
|
SecurityTracker Alert ID: 1018159 |
SecurityTracker URL: http://securitytracker.com/id/1018159
|
CVE Reference:
CVE-2007-0494
(Links to External Site)
|
Date: May 31 2007
|
Impact:
Denial of service via network
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): 9.0.x, 9.1.x, 9.2.0 - 9.2.7, 9.3.0 - 9.3.3, 9.4.x prior to 9.4.0rc2
|
Description:
A vulnerability was reported in BIND. A remote user can cause denial of service conditions.
A remote user can send specially crafted data to cause the target service to crash. A type * (ANY) DNS query that results in a response with multiple RRsets can trigger this flaw in the DNSSEC validation code.
The following versions are affected:
BIND 9.0.x
BIND 9.1.x
BIND 9.2.0, 9.2.1, 9.2.2, 9.2.3, 9.2.4, 9.2.5, 9.2.6, 9.2.7
BIND 9.3.0, 9.3.1, 9.3.2, 9.3.3
BIND 9.4.0a1, 9.4.0a2, 9.4.0a3, 9.4.0a4, 9.4.0a5, 9.4.0a6, 9.4.0b1, 9.4.0b2, 9.4.0b3, 9.4.0b4, 9.4.0rc1
BIND 9.5.0a1 (Bind Forum only)
|
Impact:
A remote user can cause the target name service to crash.
|
Solution:
IBM has developed the following fixes.
APAR number for AIX 5200-10: IY98546 (available approx. 06/01/07)
APAR number for AIX 5300-06: IY98417 (available approx. 06/01/07)
"Customers should ensure that APARs IY98546 and IY98417 are installed on
5200-10 and 5300-06 systems respectively. If these APARs are not installed,
they should be downloaded from Fix Central. These technology levels and
APARs will be made available concurrently."
Interim fixes are also available at:
ftp://aix.software.ibm.com/aix/efixes/security/binddnssec_ifix.tar.Z
|
Vendor URL: www.isc.org/ (Links to External Site)
|
Cause:
State error
|
Underlying OS: UNIX (AIX)
|
Underlying OS Comments: 5.2, 5.3
|
|
Message History:
This archive entry is a follow-up to the message listed below.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|