Debian: DSA-1795-1: New ldns packages fix arbitrary code execution

    Date07 May 2009
    CategoryDebian
    28
    Posted ByLinuxSecurity Advisories
    Stefan Kaltenbrunner discovered that ldns, a library and set of utilities to facilitate DNS programming, did not correctly implement a buffer boundary check in its RR DNS record parser. This weakness could enable overflow of a heap buffer if a maliciously-crafted record is parsed,
    
    - ------------------------------------------------------------------------
    Debian Security Advisory DSA-1795                    This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                           Devin Carraway
    May 07, 2009                          http://www.debian.org/security/faq
    - ------------------------------------------------------------------------
    
    Package        : ldns
    Vulnerability  : buffer overflow
    Problem type   : local (remote)
    Debian-specific: no
    CVE Id(s)      : CVE-2009-1086
    
    Stefan Kaltenbrunner discovered that ldns, a library and set of utilities
    to facilitate DNS programming, did not correctly implement a buffer
    boundary check in its RR DNS record parser.  This weakness could enable
    overflow of a heap buffer if a maliciously-crafted record is parsed,
    potentially allowing the execution of arbitrary code.  The scope of
    compromise will vary with the context in which ldns is used, and could
    present either a local or remote attack vector.
    
    The old stable distribution (etch) is not affected by this issue.
    
    For the stable distribution (lenny), this problem has been fixed in
    version 1.4.0-1+lenny1.
    
    For the unstable distribution (sid), this problem was fixed in
    version 1.5.1-1.
    
    We recommend that you upgrade your ldns packages.
    
    Upgrade instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    
    Debian GNU/Linux 4.0 alias etch
    - -------------------------------
    
    Debian GNU/Linux 5.0 alias lenny
    - --------------------------------
    
    Debian (stable)
    - ---------------
    
    Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
    
    Source archives:
    
      http://security.debian.org/pool/updates/main/l/ldns/ldns_1.4.0.orig.tar.gz
        Size/MD5 checksum:   807484 3af0b721222afa8bbfbe6db22b4be613
      http://security.debian.org/pool/updates/main/l/ldns/ldns_1.4.0-1+lenny1.diff.gz
        Size/MD5 checksum:    42602 ec277451483fc47ca762a41871bdd221
      http://security.debian.org/pool/updates/main/l/ldns/ldns_1.4.0-1+lenny1.dsc
        Size/MD5 checksum:     1034 988f2ea0ec08e7ec89ac4990556e4b1a
    
    alpha architecture (DEC Alpha)
    
      http://security.debian.org/pool/updates/main/l/ldns/ldnsutils_1.4.0-1+lenny1_alpha.deb
        Size/MD5 checksum:   154268 669a25a26228798017e484eac3aa4165
      http://security.debian.org/pool/updates/main/l/ldns/libldns-dev_1.4.0-1+lenny1_alpha.deb
        Size/MD5 checksum:   352842 60a9e03f7d4369d6f588669c9e3f15b3
      http://security.debian.org/pool/updates/main/l/ldns/libldns1_1.4.0-1+lenny1_alpha.deb
        Size/MD5 checksum:   133694 a5d8ae4f5c91f94c5ae8fecf03340d5e
    
    amd64 architecture (AMD x86_64 (AMD64))
    
      http://security.debian.org/pool/updates/main/l/ldns/libldns-dev_1.4.0-1+lenny1_amd64.deb
        Size/MD5 checksum:   298050 a759b7e90b25fa009718ae97e7394bad
      http://security.debian.org/pool/updates/main/l/ldns/libldns1_1.4.0-1+lenny1_amd64.deb
        Size/MD5 checksum:   123816 861a02e0ba8da5dd26dcfbf795ba66bb
      http://security.debian.org/pool/updates/main/l/ldns/ldnsutils_1.4.0-1+lenny1_amd64.deb
        Size/MD5 checksum:   147108 de8d28ab89af6f2cb5c8874515551cd2
    
    arm architecture (ARM)
    
      http://security.debian.org/pool/updates/main/l/ldns/libldns-dev_1.4.0-1+lenny1_arm.deb
        Size/MD5 checksum:   274872 abb3892710d70634f9234e242fa36dee
      http://security.debian.org/pool/updates/main/l/ldns/ldnsutils_1.4.0-1+lenny1_arm.deb
        Size/MD5 checksum:   132434 dbf80b7c12aff2892433305277e8ea57
      http://security.debian.org/pool/updates/main/l/ldns/libldns1_1.4.0-1+lenny1_arm.deb
        Size/MD5 checksum:    97660 c226ba159ac214ab55a05ca6222d811b
    
    armel architecture (ARM EABI)
    
      http://security.debian.org/pool/updates/main/l/ldns/libldns1_1.4.0-1+lenny1_armel.deb
        Size/MD5 checksum:    98754 6419159ea05543740804ae7d00834ec9
      http://security.debian.org/pool/updates/main/l/ldns/libldns-dev_1.4.0-1+lenny1_armel.deb
        Size/MD5 checksum:   273732 08ed6d16d8c4b355122d25458ef4d8d9
      http://security.debian.org/pool/updates/main/l/ldns/ldnsutils_1.4.0-1+lenny1_armel.deb
        Size/MD5 checksum:   134780 fecc4ca944671beb5f383468e3d8e4c6
    
    hppa architecture (HP PA RISC)
    
      http://security.debian.org/pool/updates/main/l/ldns/libldns1_1.4.0-1+lenny1_hppa.deb
        Size/MD5 checksum:   119202 7dcb3019e21115dd9288e6718b676f8e
      http://security.debian.org/pool/updates/main/l/ldns/libldns-dev_1.4.0-1+lenny1_hppa.deb
        Size/MD5 checksum:   304434 1bf6066619bc3b95f09d3d9b868caf52
      http://security.debian.org/pool/updates/main/l/ldns/ldnsutils_1.4.0-1+lenny1_hppa.deb
        Size/MD5 checksum:   143602 1640c8ff9642882c8364d69a2bb63a10
    
    i386 architecture (Intel ia32)
    
      http://security.debian.org/pool/updates/main/l/ldns/libldns1_1.4.0-1+lenny1_i386.deb
        Size/MD5 checksum:   113166 0f2dbd1dcd9f92c280a80a5d1a7c0f1a
      http://security.debian.org/pool/updates/main/l/ldns/ldnsutils_1.4.0-1+lenny1_i386.deb
        Size/MD5 checksum:   136032 d04cfb74c763514f32fbb531c872ede1
      http://security.debian.org/pool/updates/main/l/ldns/libldns-dev_1.4.0-1+lenny1_i386.deb
        Size/MD5 checksum:   277938 66bb9673496c17fe9d37a2fd490b9dbc
    
    ia64 architecture (Intel ia64)
    
      http://security.debian.org/pool/updates/main/l/ldns/libldns-dev_1.4.0-1+lenny1_ia64.deb
        Size/MD5 checksum:   346400 ba3051e06f50d61c43bdc5f31cfeed22
      http://security.debian.org/pool/updates/main/l/ldns/libldns1_1.4.0-1+lenny1_ia64.deb
        Size/MD5 checksum:   155732 3d553d3f0dc981dd46a6e2805da734a7
      http://security.debian.org/pool/updates/main/l/ldns/ldnsutils_1.4.0-1+lenny1_ia64.deb
        Size/MD5 checksum:   185404 d575976ac67b3039cfbfa8d1f9092bce
    
    mips architecture (MIPS (Big Endian))
    
      http://security.debian.org/pool/updates/main/l/ldns/ldnsutils_1.4.0-1+lenny1_mips.deb
        Size/MD5 checksum:   133828 dda7369db1a6ffdf50acc967cfb16d28
      http://security.debian.org/pool/updates/main/l/ldns/libldns-dev_1.4.0-1+lenny1_mips.deb
        Size/MD5 checksum:   300906 2873ee98d88d660b8c0682c136ae1d9a
      http://security.debian.org/pool/updates/main/l/ldns/libldns1_1.4.0-1+lenny1_mips.deb
        Size/MD5 checksum:   102082 a5046cccee67968a498d77057554ff1a
    
    mipsel architecture (MIPS (Little Endian))
    
      http://security.debian.org/pool/updates/main/l/ldns/libldns-dev_1.4.0-1+lenny1_mipsel.deb
        Size/MD5 checksum:   300220 262c6660c652b447fb36c62f28004571
      http://security.debian.org/pool/updates/main/l/ldns/ldnsutils_1.4.0-1+lenny1_mipsel.deb
        Size/MD5 checksum:   133832 47b9bd225a2590f74101799cc56553e5
      http://security.debian.org/pool/updates/main/l/ldns/libldns1_1.4.0-1+lenny1_mipsel.deb
        Size/MD5 checksum:   101384 9155b1a75f3a6ba8379cb3cd90a8e3f0
    
    powerpc architecture (PowerPC)
    
      http://security.debian.org/pool/updates/main/l/ldns/libldns1_1.4.0-1+lenny1_powerpc.deb
        Size/MD5 checksum:   121704 1db8fba9a463d2c13b778e3ce4506166
      http://security.debian.org/pool/updates/main/l/ldns/ldnsutils_1.4.0-1+lenny1_powerpc.deb
        Size/MD5 checksum:   183408 3fb158b2c0a4cebabf29bb14c40a6f63
      http://security.debian.org/pool/updates/main/l/ldns/libldns-dev_1.4.0-1+lenny1_powerpc.deb
        Size/MD5 checksum:   292974 83cdffb0fa56120b18674850e37a3adf
    
    s390 architecture (IBM S/390)
    
      http://security.debian.org/pool/updates/main/l/ldns/libldns-dev_1.4.0-1+lenny1_s390.deb
        Size/MD5 checksum:   296340 514869e5dbef20738cf1c10ac2bfe365
      http://security.debian.org/pool/updates/main/l/ldns/ldnsutils_1.4.0-1+lenny1_s390.deb
        Size/MD5 checksum:   150064 5a2a6856085d05065e6c83fc85acceea
      http://security.debian.org/pool/updates/main/l/ldns/libldns1_1.4.0-1+lenny1_s390.deb
        Size/MD5 checksum:   130754 013a58c936f76cd0014c68d211ec702a
    
    sparc architecture (Sun SPARC/UltraSPARC)
    
      http://security.debian.org/pool/updates/main/l/ldns/libldns1_1.4.0-1+lenny1_sparc.deb
        Size/MD5 checksum:   105488 7b61f31b2ff4f083827f87268d86cd27
      http://security.debian.org/pool/updates/main/l/ldns/libldns-dev_1.4.0-1+lenny1_sparc.deb
        Size/MD5 checksum:   279702 ceb4483705cf3b91f0ec266f5eae4f1b
      http://security.debian.org/pool/updates/main/l/ldns/ldnsutils_1.4.0-1+lenny1_sparc.deb
        Size/MD5 checksum:   137774 29820cb49b777eff7f8348d39402ceec
    
    
      These files will probably be moved into the stable distribution on
      its next update.
    
    - ---------------------------------------------------------------------------------
    For apt-get: deb http://security.debian.org/ stable/updates main
    For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and http://packages.debian.org/
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"15","type":"x","order":"1","pct":53.57,"resources":[]},{"id":"88","title":"Should be more technical","votes":"4","type":"x","order":"2","pct":14.29,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"9","type":"x","order":"3","pct":32.14,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.