Debian: DSA-1803-1: New nsd packages fix denial of service

    Date20 May 2009
    CategoryDebian
    81
    Posted ByLinuxSecurity Advisories
    Ilja van Sprundel discovered that a buffer overflow in NSD, an authoritative name service daemon, allowed to crash the server by sending a crafted packet, creating a denial of service.
    
    - ------------------------------------------------------------------------
    Debian Security Advisory DSA-1803-1                  This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                          Thijs Kinkhorst
    May 20, 2009                          http://www.debian.org/security/faq
    - ------------------------------------------------------------------------
    
    Package        : nsd, nsd3
    Vulnerability  : buffer overflow
    Problem type   : remote
    Debian-specific: no
    CERT advisory  : VU#710316
    Debian Bug     : 529418 529420
    
    Ilja van Sprundel discovered that a buffer overflow in NSD, an authoritative
    name service daemon, allowed to crash the server by sending a crafted packet,
    creating a denial of service.
    
    For the old stable distribution (etch), this problem has been fixed in
    version 2.3.6-1+etch1 of the nsd package.
    
    For the stable distribution (lenny), this problem has been fixed in
    version 2.3.7-1.1+lenny1 of the nsd package and version 3.0.7-3.lenny2
    of the nsd3 package.
    
    For the unstable distribution (sid), this problem has been fixed in
    version 2.3.7-3 for nsd; nsd3 will be fixed soon.
    
    We recommend that you upgrade your nsd or nsd3 package.
    
    Upgrade instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    
    
    
    Debian GNU/Linux 4.0 alias etch
    - -------------------------------
    
    Source archives:
    
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1.dsc
        Size/MD5 checksum:      923 cd9d37244bfa45fb346d99c8d2bab5a0
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1.diff.gz
        Size/MD5 checksum:     7539 ceed33911e93f79ddce6a60621685f5a
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6.orig.tar.gz
        Size/MD5 checksum:   244341 72428cdacc5bee63b4477becda27bf64
    
    alpha architecture (DEC Alpha)
    
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1_alpha.deb
        Size/MD5 checksum:   194322 13058fc4ed4a42d2bbc7f7e85fb791fb
    
    amd64 architecture (AMD x86_64 (AMD64))
    
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1_amd64.deb
        Size/MD5 checksum:   177140 9daa54fb763342b1321b7712741de2ea
    
    arm architecture (ARM)
    
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1_arm.deb
        Size/MD5 checksum:   163430 a5059831b7ffa616e036270db41804e0
    
    hppa architecture (HP PA RISC)
    
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1_hppa.deb
        Size/MD5 checksum:   173994 2b21dbd395b75a8cfc613d0635eb019e
    
    i386 architecture (Intel ia32)
    
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1_i386.deb
        Size/MD5 checksum:   152192 d88a2ec27887b12bf4e1a484cea49a8b
    
    ia64 architecture (Intel ia64)
    
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1_ia64.deb
        Size/MD5 checksum:   251552 f5d23f860796da56bc46d0db6a107df3
    
    mips architecture (MIPS (Big Endian))
    
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1_mips.deb
        Size/MD5 checksum:   181054 ed978a5748af27f948cdd500246369f7
    
    mipsel architecture (MIPS (Little Endian))
    
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1_mipsel.deb
        Size/MD5 checksum:   180086 5c2e2968fb1d55012f13a91db4111fae
    
    powerpc architecture (PowerPC)
    
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1_powerpc.deb
        Size/MD5 checksum:   165350 eea339cca9c3ab1579d8c11e693b06c3
    
    s390 architecture (IBM S/390)
    
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1_s390.deb
        Size/MD5 checksum:   192112 1e8f87dee014b95f79342b59a84fb1c2
    
    sparc architecture (Sun SPARC/UltraSPARC)
    
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1_sparc.deb
        Size/MD5 checksum:   157064 aef880898bf7112c0785e410d197dedc
    
    Debian GNU/Linux 5.0 alias lenny
    - --------------------------------
    
    Source archives:
    
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.7.orig.tar.gz
        Size/MD5 checksum:   230688 31a36167098a0ec9d736e113720c517f
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.7-1.1+lenny1.dsc
        Size/MD5 checksum:     1347 766ac0c2f837be4be85b0298de82d3fe
      http://security.debian.org/pool/updates/main/n/nsd3/nsd3_3.0.7-3.lenny2.diff.gz
        Size/MD5 checksum:     7042 49dcc53aac9ce7f2e7c06c8a96f3bf1a
      http://security.debian.org/pool/updates/main/n/nsd3/nsd3_3.0.7.orig.tar.gz
        Size/MD5 checksum:   818770 37558edef2fe9d9052aafeb73effd4ac
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.7-1.1+lenny1.diff.gz
        Size/MD5 checksum:     7876 a6d535df5c74f3a62fb3e3336070bbdc
      http://security.debian.org/pool/updates/main/n/nsd3/nsd3_3.0.7-3.lenny2.dsc
        Size/MD5 checksum:     1411 8730419f9ee96a1a77ec3ae273f838ce
    
    alpha architecture (DEC Alpha)
    
      http://security.debian.org/pool/updates/main/n/nsd3/nsd3_3.0.7-3.lenny2_alpha.deb
        Size/MD5 checksum:   931424 64ac4633c66fa351313b415703a9bbcd
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.7-1.1+lenny1_alpha.deb
        Size/MD5 checksum:   194632 43b9289a4fdddc6487c98ac6e11bac7a
    
    amd64 architecture (AMD x86_64 (AMD64))
    
      http://security.debian.org/pool/updates/main/n/nsd3/nsd3_3.0.7-3.lenny2_amd64.deb
        Size/MD5 checksum:   866786 1042da239b8143dd0517ef81755eff97
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.7-1.1+lenny1_amd64.deb
        Size/MD5 checksum:   178162 0ea3330f941cc695b9a1e2095cb0c23e
    
    arm architecture (ARM)
    
      http://security.debian.org/pool/updates/main/n/nsd3/nsd3_3.0.7-3.lenny2_arm.deb
        Size/MD5 checksum:   832386 4af78e6000d3c0f75cc971d5d6b078aa
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.7-1.1+lenny1_arm.deb
        Size/MD5 checksum:   164080 a5d0c30e86acb8f513f85f507122ed77
    
    armel architecture (ARM EABI)
    
      http://security.debian.org/pool/updates/main/n/nsd3/nsd3_3.0.7-3.lenny2_armel.deb
        Size/MD5 checksum:   828540 1befd0d9dd80ff7deb38eab73b1967f4
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.7-1.1+lenny1_armel.deb
        Size/MD5 checksum:   164332 6bdaf8f813b935ad8b8672af78ef4a44
    
    hppa architecture (HP PA RISC)
    
      http://security.debian.org/pool/updates/main/n/nsd3/nsd3_3.0.7-3.lenny2_hppa.deb
        Size/MD5 checksum:   868922 ca0188300d8b9deed23b59783fe474e0
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.7-1.1+lenny1_hppa.deb
        Size/MD5 checksum:   172328 fb768d81aea282b1904a1340a0e20305
    
    i386 architecture (Intel ia32)
    
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.7-1.1+lenny1_i386.deb
        Size/MD5 checksum:   151978 4a6b5c035edc76280213fc2993eecfd5
      http://security.debian.org/pool/updates/main/n/nsd3/nsd3_3.0.7-3.lenny2_i386.deb
        Size/MD5 checksum:   818688 de76aca5b0faa113e92387913eccfa7b
    
    ia64 architecture (Intel ia64)
    
      http://security.debian.org/pool/updates/main/n/nsd3/nsd3_3.0.7-3.lenny2_ia64.deb
        Size/MD5 checksum:  1057772 7ca12ad0b60fea4b5b5aeb632f4b6e7b
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.7-1.1+lenny1_ia64.deb
        Size/MD5 checksum:   252356 2974009b40200b97cba3f135b5618153
    
    mips architecture (MIPS (Big Endian))
    
      http://security.debian.org/pool/updates/main/n/nsd3/nsd3_3.0.7-3.lenny2_mips.deb
        Size/MD5 checksum:   873012 cea6d7f5dc4727d10fb731430b1a2354
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.7-1.1+lenny1_mips.deb
        Size/MD5 checksum:   176488 da7e16db1e575ee840bb6b5a1a2512ec
    
    mipsel architecture (MIPS (Little Endian))
    
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.7-1.1+lenny1_mipsel.deb
        Size/MD5 checksum:   175756 bf930128f3b8e785d5bb598885e6713e
      http://security.debian.org/pool/updates/main/n/nsd3/nsd3_3.0.7-3.lenny2_mipsel.deb
        Size/MD5 checksum:   876398 3f1155aa161303c5df9fb732541be8e1
    
    powerpc architecture (PowerPC)
    
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.7-1.1+lenny1_powerpc.deb
        Size/MD5 checksum:   172556 96e2119d4bc2134cae84361b1d7871ba
      http://security.debian.org/pool/updates/main/n/nsd3/nsd3_3.0.7-3.lenny2_powerpc.deb
        Size/MD5 checksum:   866798 8e3b5a7240ebcc2e1bb13af4afecef26
    
    s390 architecture (IBM S/390)
    
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.7-1.1+lenny1_s390.deb
        Size/MD5 checksum:   189470 3cb83c5238794d38d1ca4c68ca1c6bf9
      http://security.debian.org/pool/updates/main/n/nsd3/nsd3_3.0.7-3.lenny2_s390.deb
        Size/MD5 checksum:   873028 27fd9a0e858dd39f88fefbfe3324306b
    
    sparc architecture (Sun SPARC/UltraSPARC)
    
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.7-1.1+lenny1_sparc.deb
        Size/MD5 checksum:   159876 7ef6dd367667c534ea4340aea617166c
      http://security.debian.org/pool/updates/main/n/nsd3/nsd3_3.0.7-3.lenny2_sparc.deb
        Size/MD5 checksum:   823800 42bd1fd97830bf1d45c743952b13a9a3
    
    
      These files will probably be moved into the stable distribution on
      its next update.
    
    - ---------------------------------------------------------------------------------
    For apt-get: deb http://security.debian.org/ stable/updates main
    For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and http://packages.debian.org/
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"39","type":"x","order":"1","pct":51.32,"resources":[]},{"id":"88","title":"Should be more technical","votes":"11","type":"x","order":"2","pct":14.47,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"26","type":"x","order":"3","pct":34.21,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.