English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 75516 CVE descriptions
and 39786 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.57363
Category:Ubuntu Local Security Checks
Title:Ubuntu USN-343-1 (bind9)
Summary:Ubuntu USN-343-1 (bind9)
Description:
The remote host is missing an update to bind9
announced via advisory USN-343-1.

===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
bind9 1:9.2.4-1ubuntu1.1

Ubuntu 5.10:
bind9 1:9.3.1-2ubuntu1.1

Ubuntu 6.06 LTS:
bind9 1:9.3.2-2ubuntu1.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

bind did not sufficiently verify particular requests and responses
from other name servers and users. By sending a specially crafted
packet, a remote attacker could exploit this to crash the name server.





Solution:
http://www.securityspace.com/smysecure/catid.html?in=USN-343-1

Risk factor : Medium
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2006-4095
Bugtraq: 20060908 rPSA-2006-0166-1 bind bind-utils (Google Search)
http://www.securityfocus.com/archive/1/archive/1/445600/100/0/threaded
http://www.niscc.gov.uk/niscc/docs/re-20060905-00590.pdf?lang=en
http://lists.apple.com/archives/security-announce/2007/May/msg00004.html
Debian Security Information: DSA-1172 (Google Search)
http://www.us.debian.org/security/2006/dsa-1172
FreeBSD Security Advisory: FreeBSD-SA-06:20.bind
http://security.freebsd.org/advisories/FreeBSD-SA-06:20.bind.asc
http://security.gentoo.org/glsa/glsa-200609-11.xml
HPdes Security Advisory: HPSBTU02207
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
HPdes Security Advisory: SSRT061213
HPdes Security Advisory: SSRT061239
HPdes Security Advisory: SSRT071304
http://www.mandriva.com/security/advisories?name=MDKSA-2006:163
OpenBSD Security Advisory: [3.9] 20060908 010: SECURITY FIX: September 8, 2006
http://www.openbsd.org/errata.html
http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.019.html
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.481241
SuSE Security Announcement: SUSE-SR:2006:023 (Google Search)
http://www.novell.com/linux/security/advisories/2006_23_sr.html
SuSE Security Announcement: SUSE-SR:2006:024 (Google Search)
http://www.novell.com/linux/security/advisories/2006_24_sr.html
http://www.ubuntu.com/usn/usn-343-1
CERT/CC vulnerability note: VU#915404
http://www.kb.cert.org/vuls/id/915404
BugTraq ID: 19859
http://www.securityfocus.com/bid/19859
http://www.vupen.com/english/advisories/2006/3473
http://www.vupen.com/english/advisories/2007/1401
http://www.vupen.com/english/advisories/2007/1939
http://securitytracker.com/id?1016794
http://secunia.com/advisories/21752
http://secunia.com/advisories/21816
http://secunia.com/advisories/21786
http://secunia.com/advisories/21818
http://secunia.com/advisories/21828
http://secunia.com/advisories/21835
http://secunia.com/advisories/21838
http://secunia.com/advisories/21912
http://secunia.com/advisories/21926
http://secunia.com/advisories/22298
http://secunia.com/advisories/24950
http://secunia.com/advisories/25402
XForce ISS Database: bind-dnssec-rrset-dos(28745)
http://xforce.iss.net/xforce/xfdb/28745
Common Vulnerability Exposure (CVE) ID: CVE-2006-4096
AIX APAR: IY89169
http://www-1.ibm.com/support/docview.wss?uid=isg1IY89169
AIX APAR: IY89178
http://www-1.ibm.com/support/docview.wss?uid=isg1IY89178
CERT/CC vulnerability note: VU#697164
http://www.kb.cert.org/vuls/id/697164
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9623
http://www.vupen.com/english/advisories/2006/3511
http://secunia.com/advisories/21790
XForce ISS Database: bind-recursive-insist-dos(28744)
http://xforce.iss.net/xforce/xfdb/28744
CopyrightCopyright (c) 2006 E-Soft Inc. http://www.securityspace.com

This is only one of 39786 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.