what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Slackware Security Advisory - BIND Denial Of Service

Slackware Security Advisory - BIND Denial Of Service
Posted Jun 16, 2012
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - This release fixes an issue that could crash BIND, leading to a denial of service. It also fixes the so-called "ghost names attack" whereby a remote attacker may trigger continued resolvability of revoked domain names.

tags | advisory, remote, denial of service
systems | linux, slackware
advisories | CVE-2012-1033, CVE-2012-1667
SHA-256 | a54b3637c35e8d72b4ce0639ba7fb35571f225581e9ef820090c98d7c73749c4

Slackware Security Advisory - BIND Denial Of Service

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] bind (SSA:2012-166-01)

New bind packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2,
11.0, 12.0, 12.1, 12.2, 13.0, 13.1, 13.37, and -current to fix security issues.


Here are the details from the Slackware 13.37 ChangeLog:
+--------------------------+
This release fixes an issue that could crash BIND, leading to a denial of
service. It also fixes the so-called "ghost names attack" whereby a
remote attacker may trigger continued resolvability of revoked domain names.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1033
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1667
(* Security fix *)
+--------------------------+

On Slackware 8.1, only CVE-2012-1667 was patched (see ChangeLog).

IMPORTANT NOTE FOR ON SLACKWARE 9.0 - 13.1:

These versions were upgraded with a new version of BIND, _not_ a patched one.
It is likely to be more strict about the correctness of configuration files.
Care should be taken about deploying this upgrade on production servers to
avoid an unintended interruption of service.


Where to find the new packages:
+-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)

Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.

Updated package for Slackware 8.1:
ftp://ftp.slackware.com/pub/slackware/slackware-8.1/patches/packages/bind-9.4_ESV_R5-i386-2_slack8.1.tgz

Updated package for Slackware 9.0:
ftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/packages/bind-9.7.6_P1-i386-1_slack9.0.tgz

Updated package for Slackware 9.1:
ftp://ftp.slackware.com/pub/slackware/slackware-9.1/patches/packages/bind-9.7.6_P1-i486-1_slack9.1.tgz

Updated package for Slackware 10.0:
ftp://ftp.slackware.com/pub/slackware/slackware-10.0/patches/packages/bind-9.7.6_P1-i486-1_slack10.0.tgz

Updated package for Slackware 10.1:
ftp://ftp.slackware.com/pub/slackware/slackware-10.1/patches/packages/bind-9.7.6_P1-i486-1_slack10.1.tgz

Updated package for Slackware 10.2:
ftp://ftp.slackware.com/pub/slackware/slackware-10.2/patches/packages/bind-9.7.6_P1-i486-1_slack10.2.tgz

Updated package for Slackware 11.0:
ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/bind-9.7.6_P1-i486-1_slack11.0.tgz

Updated package for Slackware 12.0:
ftp://ftp.slackware.com/pub/slackware/slackware-12.0/patches/packages/bind-9.7.6_P1-i486-1_slack12.0.tgz

Updated package for Slackware 12.1:
ftp://ftp.slackware.com/pub/slackware/slackware-12.1/patches/packages/bind-9.7.6_P1-i486-1_slack12.1.tgz

Updated package for Slackware 12.2:
ftp://ftp.slackware.com/pub/slackware/slackware-12.2/patches/packages/bind-9.7.6_P1-i486-1_slack12.2.tgz

Updated package for Slackware 13.0:
ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/bind-9.7.6_P1-i486-1_slack13.0.txz

Updated package for Slackware x86_64 13.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/bind-9.7.6_P1-x86_64-1_slack13.0.txz

Updated package for Slackware 13.1:
ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/bind-9.7.6_P1-i486-1_slack13.1.txz

Updated package for Slackware x86_64 13.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/bind-9.7.6_P1-x86_64-1_slack13.1.txz

Updated package for Slackware 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/bind-9.7.6_P1-i486-1_slack13.37.txz

Updated package for Slackware x86_64 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/bind-9.7.6_P1-x86_64-1_slack13.37.txz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/bind-9.9.1_P1-i486-1.txz

Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/bind-9.9.1_P1-x86_64-1.txz


MD5 signatures:
+-------------+

Slackware 8.1 package:
368676b58d45aeb44bb2709fef9b9dc9 bind-9.4_ESV_R5-i386-2_slack8.1.tgz

Slackware 9.0 package:
496c543f5cead74b532701c4a5ce2e9a bind-9.7.6_P1-i386-1_slack9.0.tgz

Slackware 9.1 package:
c2fa98d41c6192f9dee90fbf20087f74 bind-9.7.6_P1-i486-1_slack9.1.tgz

Slackware 10.0 package:
6f6d80d82bfad02b31c6cf978f9c4eb3 bind-9.7.6_P1-i486-1_slack10.0.tgz

Slackware 10.1 package:
3b044cb5268b5aa2a730e6023cd51dbe bind-9.7.6_P1-i486-1_slack10.1.tgz

Slackware 10.2 package:
5bcc0624a83bdb6a7624a951df8d9ac1 bind-9.7.6_P1-i486-1_slack10.2.tgz

Slackware 11.0 package:
5f5bef76e32dff698093f4d40aaf9e22 bind-9.7.6_P1-i486-1_slack11.0.tgz

Slackware 12.0 package:
e9cdeb8717363e648008890bde6f1cac bind-9.7.6_P1-i486-1_slack12.0.tgz

Slackware 12.1 package:
cdcadbc6cae03b16e39a222f24e3786b bind-9.7.6_P1-i486-1_slack12.1.tgz

Slackware 12.2 package:
77ce739695fd60507628410bb629df7a bind-9.7.6_P1-i486-1_slack12.2.tgz

Slackware 13.0 package:
52eb3c84976d1047dc82b0a7d306a59e bind-9.7.6_P1-i486-1_slack13.0.txz

Slackware x86_64 13.0 package:
dfebcdf94ff058fe5a78cd41bedddc4f bind-9.7.6_P1-x86_64-1_slack13.0.txz

Slackware 13.1 package:
f15ec3e442c950c0c0ab9a63b80a1f26 bind-9.7.6_P1-i486-1_slack13.1.txz

Slackware x86_64 13.1 package:
47f1ed3d833c223ad29331d6d38535b7 bind-9.7.6_P1-x86_64-1_slack13.1.txz

Slackware 13.37 package:
f6c28f56889b14020b2c3d034a3ea889 bind-9.7.6_P1-i486-1_slack13.37.txz

Slackware x86_64 13.37 package:
6d177613e029056f533c2f4abddbfb0d bind-9.7.6_P1-x86_64-1_slack13.37.txz

Slackware -current package:
04a8c4613863017b632c92b93732834c n/bind-9.9.1_P1-i486-1.txz

Slackware x86_64 -current package:
8abe838febee6d569e52d7b2e7812cc8 n/bind-9.9.1_P1-x86_64-1.txz


Installation instructions:
+------------------------+

Upgrade the package as root:
# upgradepkg bind-9.7.6_P1-i486-1_slack13.37.txz

Ensure that the configuration files are compatible with the upgraded
version of BIND, and then restart the nameserver:

# /etc/rc.d/rc.bind restart


+-----+

Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com

+------------------------------------------------------------------------+
| To leave the slackware-security mailing list: |
+------------------------------------------------------------------------+
| Send an email to majordomo@slackware.com with this text in the body of |
| the email message: |
| |
| unsubscribe slackware-security |
| |
| You will get a confirmation message back containing instructions to |
| complete the process. Please do not reply to this email address. |
+------------------------------------------------------------------------+
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iEYEARECAAYFAk/ZfWgACgkQakRjwEAQIjMiCACdEOdS5qBXmIzaw6u3BxqAE+Fh
GMAAnR3+TRdJSL1y0xku9LMb4S+EBpZt
=8liY
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    53 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close