Description: | Description: The remote host is missing an update to bind9 announced via advisory USN-888-1.
Details follow:
It was discovered that Bind would incorrectly cache bogus NXDOMAIN responses. When DNSSEC validation is in use, a remote attacker could exploit this to cause a denial of service, and possibly poison DNS caches. (CVE-2010-0097)
USN-865-1 provided updated Bind packages to fix a security vulnerability. The upstream security patch to fix CVE-2009-4022 was incomplete and CVE-2010-0290 was assigned to the issue. This update corrects the problem. Original advisory details:
Michael Sinatra discovered that Bind did not correctly validate certain records added to its cache. When DNSSEC validation is in use, a remote attacker could exploit this to spoof DNS entries and poison DNS caches. Among other things, this could lead to misdirected email and web traffic.
Solution: The problem can be corrected by upgrading your system to the following package versions:
Ubuntu 6.06 LTS: libdns23 1:9.3.2-2ubuntu1.11
Ubuntu 8.04 LTS: libdns36 1:9.4.2.dfsg.P2-2ubuntu0.5
Ubuntu 8.10: libdns44 1:9.5.0.dfsg.P2-1ubuntu3.5
Ubuntu 9.04: libdns46 1:9.5.1.dfsg.P2-1ubuntu0.4
Ubuntu 9.10: libdns53 1:9.6.1.dfsg.P1-3ubuntu0.3
In general, a standard system upgrade is sufficient to effect the necessary changes.
http://www.securityspace.com/smysecure/catid.html?in=USN-888-1
Risk factor : Medium
CVSS Score: 4.3
|