- ------------------------------------------------------------------------
Debian Security Advisory DSA-1795                    security@debian.org
http://www.debian.org/security/                           Devin Carraway
May 07, 2009                          http://www.debian.org/security/faq
- ------------------------------------------------------------------------

Package        : ldns
Vulnerability  : buffer overflow
Problem type   : local (remote)
Debian-specific: no
CVE Id(s)      : CVE-2009-1086

Stefan Kaltenbrunner discovered that ldns, a library and set of utilities
to facilitate DNS programming, did not correctly implement a buffer
boundary check in its RR DNS record parser.  This weakness could enable
overflow of a heap buffer if a maliciously-crafted record is parsed,
potentially allowing the execution of arbitrary code.  The scope of
compromise will vary with the context in which ldns is used, and could
present either a local or remote attack vector.

The old stable distribution (etch) is not affected by this issue.

For the stable distribution (lenny), this problem has been fixed in
version 1.4.0-1+lenny1.

For the unstable distribution (sid), this problem was fixed in
version 1.5.1-1.

We recommend that you upgrade your ldns packages.

Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 4.0 alias etch
- -------------------------------

Debian GNU/Linux 5.0 alias lenny
- --------------------------------

Debian (stable)
- ---------------

Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

      Size/MD5 checksum:   807484 3af0b721222afa8bbfbe6db22b4be613
      Size/MD5 checksum:    42602 ec277451483fc47ca762a41871bdd221
      Size/MD5 checksum:     1034 988f2ea0ec08e7ec89ac4990556e4b1a

alpha architecture (DEC Alpha)

      Size/MD5 checksum:   154268 669a25a26228798017e484eac3aa4165
      Size/MD5 checksum:   352842 60a9e03f7d4369d6f588669c9e3f15b3
      Size/MD5 checksum:   133694 a5d8ae4f5c91f94c5ae8fecf03340d5e

amd64 architecture (AMD x86_64 (AMD64))

      Size/MD5 checksum:   298050 a759b7e90b25fa009718ae97e7394bad
      Size/MD5 checksum:   123816 861a02e0ba8da5dd26dcfbf795ba66bb
      Size/MD5 checksum:   147108 de8d28ab89af6f2cb5c8874515551cd2

arm architecture (ARM)

      Size/MD5 checksum:   274872 abb3892710d70634f9234e242fa36dee
      Size/MD5 checksum:   132434 dbf80b7c12aff2892433305277e8ea57
      Size/MD5 checksum:    97660 c226ba159ac214ab55a05ca6222d811b

armel architecture (ARM EABI)

      Size/MD5 checksum:    98754 6419159ea05543740804ae7d00834ec9
      Size/MD5 checksum:   273732 08ed6d16d8c4b355122d25458ef4d8d9
      Size/MD5 checksum:   134780 fecc4ca944671beb5f383468e3d8e4c6

hppa architecture (HP PA RISC)

      Size/MD5 checksum:   119202 7dcb3019e21115dd9288e6718b676f8e
      Size/MD5 checksum:   304434 1bf6066619bc3b95f09d3d9b868caf52
      Size/MD5 checksum:   143602 1640c8ff9642882c8364d69a2bb63a10

i386 architecture (Intel ia32)

      Size/MD5 checksum:   113166 0f2dbd1dcd9f92c280a80a5d1a7c0f1a
      Size/MD5 checksum:   136032 d04cfb74c763514f32fbb531c872ede1
      Size/MD5 checksum:   277938 66bb9673496c17fe9d37a2fd490b9dbc

ia64 architecture (Intel ia64)

      Size/MD5 checksum:   346400 ba3051e06f50d61c43bdc5f31cfeed22
      Size/MD5 checksum:   155732 3d553d3f0dc981dd46a6e2805da734a7
      Size/MD5 checksum:   185404 d575976ac67b3039cfbfa8d1f9092bce

mips architecture (MIPS (Big Endian))

      Size/MD5 checksum:   133828 dda7369db1a6ffdf50acc967cfb16d28
      Size/MD5 checksum:   300906 2873ee98d88d660b8c0682c136ae1d9a
      Size/MD5 checksum:   102082 a5046cccee67968a498d77057554ff1a

mipsel architecture (MIPS (Little Endian))

      Size/MD5 checksum:   300220 262c6660c652b447fb36c62f28004571
      Size/MD5 checksum:   133832 47b9bd225a2590f74101799cc56553e5
      Size/MD5 checksum:   101384 9155b1a75f3a6ba8379cb3cd90a8e3f0

powerpc architecture (PowerPC)

      Size/MD5 checksum:   121704 1db8fba9a463d2c13b778e3ce4506166
      Size/MD5 checksum:   183408 3fb158b2c0a4cebabf29bb14c40a6f63
      Size/MD5 checksum:   292974 83cdffb0fa56120b18674850e37a3adf

s390 architecture (IBM S/390)

      Size/MD5 checksum:   296340 514869e5dbef20738cf1c10ac2bfe365
      Size/MD5 checksum:   150064 5a2a6856085d05065e6c83fc85acceea
      Size/MD5 checksum:   130754 013a58c936f76cd0014c68d211ec702a

sparc architecture (Sun SPARC/UltraSPARC)

      Size/MD5 checksum:   105488 7b61f31b2ff4f083827f87268d86cd27
      Size/MD5 checksum:   279702 ceb4483705cf3b91f0ec266f5eae4f1b
      Size/MD5 checksum:   137774 29820cb49b777eff7f8348d39402ceec


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp:  dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and http://packages.debian.org/

Debian: DSA-1795-1: New ldns packages fix arbitrary code execution

May 7, 2009
Stefan Kaltenbrunner discovered that ldns, a library and set of utilities to facilitate DNS programming, did not correctly implement a buffer boundary check in its RR DNS record pa...

Summary

The old stable distribution (etch) is not affected by this issue.

For the stable distribution (lenny), this problem has been fixed in
version 1.4.0-1+lenny1.

For the unstable distribution (sid), this problem was fixed in
version 1.5.1-1.

We recommend that you upgrade your ldns packages.

Upgrade instructions
- --------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 4.0 alias etch

Debian GNU/Linux 5.0 alias lenny

Debian (stable)
- ---------------

Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

Size/MD5 checksum: 807484 3af0b721222afa8bbfbe6db22b4be613
Size/MD5 checksum: 42602 ec277451483fc47ca762a41871bdd221
Size/MD5 checksum: 1034 988f2ea0ec08e7ec89ac4990556e4b1a

alpha architecture (DEC Alpha)

Size/MD5 checksum: 154268 669a25a26228798017e484eac3aa4165
Size/MD5 checksum: 352842 60a9e03f7d4369d6f588669c9e3f15b3
Size/MD5 checksum: 133694 a5d8ae4f5c91f94c5ae8fecf03340d5e

amd64 architecture (AMD x86_64 (AMD64))

Size/MD5 checksum: 298050 a759b7e90b25fa009718ae97e7394bad
Size/MD5 checksum: 123816 861a02e0ba8da5dd26dcfbf795ba66bb
Size/MD5 checksum: 147108 de8d28ab89af6f2cb5c8874515551cd2

arm architecture (ARM)

Size/MD5 checksum: 274872 abb3892710d70634f9234e242fa36dee
Size/MD5 checksum: 132434 dbf80b7c12aff2892433305277e8ea57
Size/MD5 checksum: 97660 c226ba159ac214ab55a05ca6222d811b

armel architecture (ARM EABI)

Size/MD5 checksum: 98754 6419159ea05543740804ae7d00834ec9
Size/MD5 checksum: 273732 08ed6d16d8c4b355122d25458ef4d8d9
Size/MD5 checksum: 134780 fecc4ca944671beb5f383468e3d8e4c6

hppa architecture (HP PA RISC)

Size/MD5 checksum: 119202 7dcb3019e21115dd9288e6718b676f8e
Size/MD5 checksum: 304434 1bf6066619bc3b95f09d3d9b868caf52
Size/MD5 checksum: 143602 1640c8ff9642882c8364d69a2bb63a10

i386 architecture (Intel ia32)

Size/MD5 checksum: 113166 0f2dbd1dcd9f92c280a80a5d1a7c0f1a
Size/MD5 checksum: 136032 d04cfb74c763514f32fbb531c872ede1
Size/MD5 checksum: 277938 66bb9673496c17fe9d37a2fd490b9dbc

ia64 architecture (Intel ia64)

Size/MD5 checksum: 346400 ba3051e06f50d61c43bdc5f31cfeed22
Size/MD5 checksum: 155732 3d553d3f0dc981dd46a6e2805da734a7
Size/MD5 checksum: 185404 d575976ac67b3039cfbfa8d1f9092bce

mips architecture (MIPS (Big Endian))

Size/MD5 checksum: 133828 dda7369db1a6ffdf50acc967cfb16d28
Size/MD5 checksum: 300906 2873ee98d88d660b8c0682c136ae1d9a
Size/MD5 checksum: 102082 a5046cccee67968a498d77057554ff1a

mipsel architecture (MIPS (Little Endian))

Size/MD5 checksum: 300220 262c6660c652b447fb36c62f28004571
Size/MD5 checksum: 133832 47b9bd225a2590f74101799cc56553e5
Size/MD5 checksum: 101384 9155b1a75f3a6ba8379cb3cd90a8e3f0

powerpc architecture (PowerPC)

Size/MD5 checksum: 121704 1db8fba9a463d2c13b778e3ce4506166
Size/MD5 checksum: 183408 3fb158b2c0a4cebabf29bb14c40a6f63
Size/MD5 checksum: 292974 83cdffb0fa56120b18674850e37a3adf

s390 architecture (IBM S/390)

Size/MD5 checksum: 296340 514869e5dbef20738cf1c10ac2bfe365
Size/MD5 checksum: 150064 5a2a6856085d05065e6c83fc85acceea
Size/MD5 checksum: 130754 013a58c936f76cd0014c68d211ec702a

sparc architecture (Sun SPARC/UltraSPARC)

Size/MD5 checksum: 105488 7b61f31b2ff4f083827f87268d86cd27
Size/MD5 checksum: 279702 ceb4483705cf3b91f0ec266f5eae4f1b
Size/MD5 checksum: 137774 29820cb49b777eff7f8348d39402ceec


These files will probably be moved into the stable distribution on
its next update.

For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and http://packages.debian.org/

Severity
Stefan Kaltenbrunner discovered that ldns, a library and set of utilities
to facilitate DNS programming, did not correctly implement a buffer
boundary check in its RR DNS record parser. This weakness could enable
overflow of a heap buffer if a maliciously-crafted record is parsed,
potentially allowing the execution of arbitrary code. The scope of
compromise will vary with the context in which ldns is used, and could
present either a local or remote attack vector.

Related News