Date:         Thu, 30 Jul 2009 14:02:41 -0500
Reply-To:     Connie Sieh 
Sender:       Security Errata for Scientific Linux
              
From:         Connie Sieh 
Subject:      Security ERRATA Important: bind for SL 5.x on i386/x86_64
Comments: To: scientific 

Synopsis:          Important: bind security update
CVE Names:         CVE-2009-0696

   CVE-2009-0696 bind: DoS (assertion failure) via nsupdate packets

A flaw was found in the way BIND handles dynamic update message packets
containing the "ANY" record type. A remote attacker could use this flaw to
send a specially-crafted dynamic update packet that could cause named to
exit with an assertion failure. (CVE-2009-0696)

Note: even if named is not configured for dynamic updates, receiving such
a specially-crafted dynamic update packet could still cause named to exit
unexpectedly.

After installing the update, the BIND daemon (named) will be restarted 
automatically.


SRPM:
    bind-9.3.4-10.P1.el5_3.3.src.rpm

i386:
    bind-9.3.4-10.P1.el5_3.3.i386.rpm
    bind-libs-9.3.4-10.P1.el5_3.3.i386.rpm
    bind-sdb-9.3.4-10.P1.el5_3.3.i386.rpm
    bind-utils-9.3.4-10.P1.el5_3.3.i386.rpm
    bind-chroot-9.3.4-10.P1.el5_3.3.i386.rpm
    bind-devel-9.3.4-10.P1.el5_3.3.i386.rpm
    bind-libbind-devel-9.3.4-10.P1.el5_3.3.i386.rpm
    caching-nameserver-9.3.4-10.P1.el5_3.3.i386.rpm

x86_64:
    bind-9.3.4-10.P1.el5_3.3.x86_64.rpm
    bind-libs-9.3.4-10.P1.el5_3.3.i386.rpm
    bind-libs-9.3.4-10.P1.el5_3.3.x86_64.rpm
    bind-sdb-9.3.4-10.P1.el5_3.3.x86_64.rpm
    bind-utils-9.3.4-10.P1.el5_3.3.x86_64.rpm
    bind-chroot-9.3.4-10.P1.el5_3.3.x86_64.rpm
    bind-devel-9.3.4-10.P1.el5_3.3.i386.rpm
    bind-devel-9.3.4-10.P1.el5_3.3.x86_64.rpm
    bind-libbind-devel-9.3.4-10.P1.el5_3.3.i386.rpm
    bind-libbind-devel-9.3.4-10.P1.el5_3.3.x86_64.rpm
    caching-nameserver-9.3.4-10.P1.el5_3.3.x86_64.rpm

-Connie Sieh
-Troy Dawson

SciLinux: CVE-2009-0696 Important: bind SL 5.x i386/x86_64

Important: bind security update

Summary

Date:         Thu, 30 Jul 2009 14:02:41 -0500Reply-To:     Connie Sieh Sender:       Security Errata for Scientific Linux              From:         Connie Sieh Subject:      Security ERRATA Important: bind for SL 5.x on i386/x86_64Comments: To: scientific Synopsis:          Important: bind security updateCVE Names:         CVE-2009-0696   CVE-2009-0696 bind: DoS (assertion failure) via nsupdate packetsA flaw was found in the way BIND handles dynamic update message packetscontaining the "ANY" record type. A remote attacker could use this flaw tosend a specially-crafted dynamic update packet that could cause named toexit with an assertion failure. (CVE-2009-0696)Note: even if named is not configured for dynamic updates, receiving sucha specially-crafted dynamic update packet could still cause named to exitunexpectedly.After installing the update, the BIND daemon (named) will be restarted automatically.SRPM:    bind-9.3.4-10.P1.el5_3.3.src.rpmi386:    bind-9.3.4-10.P1.el5_3.3.i386.rpm    bind-libs-9.3.4-10.P1.el5_3.3.i386.rpm    bind-sdb-9.3.4-10.P1.el5_3.3.i386.rpm    bind-utils-9.3.4-10.P1.el5_3.3.i386.rpm    bind-chroot-9.3.4-10.P1.el5_3.3.i386.rpm    bind-devel-9.3.4-10.P1.el5_3.3.i386.rpm    bind-libbind-devel-9.3.4-10.P1.el5_3.3.i386.rpm    caching-nameserver-9.3.4-10.P1.el5_3.3.i386.rpmx86_64:    bind-9.3.4-10.P1.el5_3.3.x86_64.rpm    bind-libs-9.3.4-10.P1.el5_3.3.i386.rpm    bind-libs-9.3.4-10.P1.el5_3.3.x86_64.rpm    bind-sdb-9.3.4-10.P1.el5_3.3.x86_64.rpm    bind-utils-9.3.4-10.P1.el5_3.3.x86_64.rpm    bind-chroot-9.3.4-10.P1.el5_3.3.x86_64.rpm    bind-devel-9.3.4-10.P1.el5_3.3.i386.rpm    bind-devel-9.3.4-10.P1.el5_3.3.x86_64.rpm    bind-libbind-devel-9.3.4-10.P1.el5_3.3.i386.rpm    bind-libbind-devel-9.3.4-10.P1.el5_3.3.x86_64.rpm    caching-nameserver-9.3.4-10.P1.el5_3.3.x86_64.rpm-Connie Sieh-Troy Dawson



Security Fixes

Severity

Related News