Debian: DSA-1803-1: New nsd packages fix denial of service

    Date20 May 2009
    CategoryDebian
    36
    Posted ByLinuxSecurity Advisories
    Ilja van Sprundel discovered that a buffer overflow in NSD, an authoritative name service daemon, allowed to crash the server by sending a crafted packet, creating a denial of service.
    
    - ------------------------------------------------------------------------
    Debian Security Advisory DSA-1803-1                  This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                          Thijs Kinkhorst
    May 20, 2009                          http://www.debian.org/security/faq
    - ------------------------------------------------------------------------
    
    Package        : nsd, nsd3
    Vulnerability  : buffer overflow
    Problem type   : remote
    Debian-specific: no
    CERT advisory  : VU#710316
    Debian Bug     : 529418 529420
    
    Ilja van Sprundel discovered that a buffer overflow in NSD, an authoritative
    name service daemon, allowed to crash the server by sending a crafted packet,
    creating a denial of service.
    
    For the old stable distribution (etch), this problem has been fixed in
    version 2.3.6-1+etch1 of the nsd package.
    
    For the stable distribution (lenny), this problem has been fixed in
    version 2.3.7-1.1+lenny1 of the nsd package and version 3.0.7-3.lenny2
    of the nsd3 package.
    
    For the unstable distribution (sid), this problem has been fixed in
    version 2.3.7-3 for nsd; nsd3 will be fixed soon.
    
    We recommend that you upgrade your nsd or nsd3 package.
    
    Upgrade instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    
    
    
    Debian GNU/Linux 4.0 alias etch
    - -------------------------------
    
    Source archives:
    
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1.dsc
        Size/MD5 checksum:      923 cd9d37244bfa45fb346d99c8d2bab5a0
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1.diff.gz
        Size/MD5 checksum:     7539 ceed33911e93f79ddce6a60621685f5a
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6.orig.tar.gz
        Size/MD5 checksum:   244341 72428cdacc5bee63b4477becda27bf64
    
    alpha architecture (DEC Alpha)
    
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1_alpha.deb
        Size/MD5 checksum:   194322 13058fc4ed4a42d2bbc7f7e85fb791fb
    
    amd64 architecture (AMD x86_64 (AMD64))
    
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1_amd64.deb
        Size/MD5 checksum:   177140 9daa54fb763342b1321b7712741de2ea
    
    arm architecture (ARM)
    
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1_arm.deb
        Size/MD5 checksum:   163430 a5059831b7ffa616e036270db41804e0
    
    hppa architecture (HP PA RISC)
    
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1_hppa.deb
        Size/MD5 checksum:   173994 2b21dbd395b75a8cfc613d0635eb019e
    
    i386 architecture (Intel ia32)
    
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1_i386.deb
        Size/MD5 checksum:   152192 d88a2ec27887b12bf4e1a484cea49a8b
    
    ia64 architecture (Intel ia64)
    
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1_ia64.deb
        Size/MD5 checksum:   251552 f5d23f860796da56bc46d0db6a107df3
    
    mips architecture (MIPS (Big Endian))
    
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1_mips.deb
        Size/MD5 checksum:   181054 ed978a5748af27f948cdd500246369f7
    
    mipsel architecture (MIPS (Little Endian))
    
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1_mipsel.deb
        Size/MD5 checksum:   180086 5c2e2968fb1d55012f13a91db4111fae
    
    powerpc architecture (PowerPC)
    
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1_powerpc.deb
        Size/MD5 checksum:   165350 eea339cca9c3ab1579d8c11e693b06c3
    
    s390 architecture (IBM S/390)
    
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1_s390.deb
        Size/MD5 checksum:   192112 1e8f87dee014b95f79342b59a84fb1c2
    
    sparc architecture (Sun SPARC/UltraSPARC)
    
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.6-1+etch1_sparc.deb
        Size/MD5 checksum:   157064 aef880898bf7112c0785e410d197dedc
    
    Debian GNU/Linux 5.0 alias lenny
    - --------------------------------
    
    Source archives:
    
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.7.orig.tar.gz
        Size/MD5 checksum:   230688 31a36167098a0ec9d736e113720c517f
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.7-1.1+lenny1.dsc
        Size/MD5 checksum:     1347 766ac0c2f837be4be85b0298de82d3fe
      http://security.debian.org/pool/updates/main/n/nsd3/nsd3_3.0.7-3.lenny2.diff.gz
        Size/MD5 checksum:     7042 49dcc53aac9ce7f2e7c06c8a96f3bf1a
      http://security.debian.org/pool/updates/main/n/nsd3/nsd3_3.0.7.orig.tar.gz
        Size/MD5 checksum:   818770 37558edef2fe9d9052aafeb73effd4ac
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.7-1.1+lenny1.diff.gz
        Size/MD5 checksum:     7876 a6d535df5c74f3a62fb3e3336070bbdc
      http://security.debian.org/pool/updates/main/n/nsd3/nsd3_3.0.7-3.lenny2.dsc
        Size/MD5 checksum:     1411 8730419f9ee96a1a77ec3ae273f838ce
    
    alpha architecture (DEC Alpha)
    
      http://security.debian.org/pool/updates/main/n/nsd3/nsd3_3.0.7-3.lenny2_alpha.deb
        Size/MD5 checksum:   931424 64ac4633c66fa351313b415703a9bbcd
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.7-1.1+lenny1_alpha.deb
        Size/MD5 checksum:   194632 43b9289a4fdddc6487c98ac6e11bac7a
    
    amd64 architecture (AMD x86_64 (AMD64))
    
      http://security.debian.org/pool/updates/main/n/nsd3/nsd3_3.0.7-3.lenny2_amd64.deb
        Size/MD5 checksum:   866786 1042da239b8143dd0517ef81755eff97
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.7-1.1+lenny1_amd64.deb
        Size/MD5 checksum:   178162 0ea3330f941cc695b9a1e2095cb0c23e
    
    arm architecture (ARM)
    
      http://security.debian.org/pool/updates/main/n/nsd3/nsd3_3.0.7-3.lenny2_arm.deb
        Size/MD5 checksum:   832386 4af78e6000d3c0f75cc971d5d6b078aa
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.7-1.1+lenny1_arm.deb
        Size/MD5 checksum:   164080 a5d0c30e86acb8f513f85f507122ed77
    
    armel architecture (ARM EABI)
    
      http://security.debian.org/pool/updates/main/n/nsd3/nsd3_3.0.7-3.lenny2_armel.deb
        Size/MD5 checksum:   828540 1befd0d9dd80ff7deb38eab73b1967f4
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.7-1.1+lenny1_armel.deb
        Size/MD5 checksum:   164332 6bdaf8f813b935ad8b8672af78ef4a44
    
    hppa architecture (HP PA RISC)
    
      http://security.debian.org/pool/updates/main/n/nsd3/nsd3_3.0.7-3.lenny2_hppa.deb
        Size/MD5 checksum:   868922 ca0188300d8b9deed23b59783fe474e0
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.7-1.1+lenny1_hppa.deb
        Size/MD5 checksum:   172328 fb768d81aea282b1904a1340a0e20305
    
    i386 architecture (Intel ia32)
    
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.7-1.1+lenny1_i386.deb
        Size/MD5 checksum:   151978 4a6b5c035edc76280213fc2993eecfd5
      http://security.debian.org/pool/updates/main/n/nsd3/nsd3_3.0.7-3.lenny2_i386.deb
        Size/MD5 checksum:   818688 de76aca5b0faa113e92387913eccfa7b
    
    ia64 architecture (Intel ia64)
    
      http://security.debian.org/pool/updates/main/n/nsd3/nsd3_3.0.7-3.lenny2_ia64.deb
        Size/MD5 checksum:  1057772 7ca12ad0b60fea4b5b5aeb632f4b6e7b
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.7-1.1+lenny1_ia64.deb
        Size/MD5 checksum:   252356 2974009b40200b97cba3f135b5618153
    
    mips architecture (MIPS (Big Endian))
    
      http://security.debian.org/pool/updates/main/n/nsd3/nsd3_3.0.7-3.lenny2_mips.deb
        Size/MD5 checksum:   873012 cea6d7f5dc4727d10fb731430b1a2354
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.7-1.1+lenny1_mips.deb
        Size/MD5 checksum:   176488 da7e16db1e575ee840bb6b5a1a2512ec
    
    mipsel architecture (MIPS (Little Endian))
    
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.7-1.1+lenny1_mipsel.deb
        Size/MD5 checksum:   175756 bf930128f3b8e785d5bb598885e6713e
      http://security.debian.org/pool/updates/main/n/nsd3/nsd3_3.0.7-3.lenny2_mipsel.deb
        Size/MD5 checksum:   876398 3f1155aa161303c5df9fb732541be8e1
    
    powerpc architecture (PowerPC)
    
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.7-1.1+lenny1_powerpc.deb
        Size/MD5 checksum:   172556 96e2119d4bc2134cae84361b1d7871ba
      http://security.debian.org/pool/updates/main/n/nsd3/nsd3_3.0.7-3.lenny2_powerpc.deb
        Size/MD5 checksum:   866798 8e3b5a7240ebcc2e1bb13af4afecef26
    
    s390 architecture (IBM S/390)
    
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.7-1.1+lenny1_s390.deb
        Size/MD5 checksum:   189470 3cb83c5238794d38d1ca4c68ca1c6bf9
      http://security.debian.org/pool/updates/main/n/nsd3/nsd3_3.0.7-3.lenny2_s390.deb
        Size/MD5 checksum:   873028 27fd9a0e858dd39f88fefbfe3324306b
    
    sparc architecture (Sun SPARC/UltraSPARC)
    
      http://security.debian.org/pool/updates/main/n/nsd/nsd_2.3.7-1.1+lenny1_sparc.deb
        Size/MD5 checksum:   159876 7ef6dd367667c534ea4340aea617166c
      http://security.debian.org/pool/updates/main/n/nsd3/nsd3_3.0.7-3.lenny2_sparc.deb
        Size/MD5 checksum:   823800 42bd1fd97830bf1d45c743952b13a9a3
    
    
      These files will probably be moved into the stable distribution on
      its next update.
    
    - ---------------------------------------------------------------------------------
    For apt-get: deb http://security.debian.org/ stable/updates main
    For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and http://packages.debian.org/
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    Do you read our distribution advisories on a regular basis?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /component/communitypolls/?task=poll.vote&format=json
    23
    radio
    [{"id":"84","title":"Yes, for a single distribution","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"85","title":"Yes, for multiple distributions","votes":"6","type":"x","order":"2","pct":60,"resources":[]},{"id":"86","title":"No","votes":"4","type":"x","order":"3","pct":40,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.