exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2007.030

Mandriva Linux Security Advisory 2007.030
Posted Jan 31, 2007
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - The use-after-free vulnerability in ISC BIND 9.3.0 up to 9.3.3, 9.4.0a1 up to 9.4.0a6, 9.4.0b1 up to 9.4.0b4, 9.4.0rc1, and 9.5.0a1 (Bind Forum only) allows remote attackers to cause a denial of service (named daemon crash) via unspecified vectors that cause named to "dereference a freed fetch context." ISC BIND 9.0.x, 9.1.x, 9.2.0 up to 9.2.7, 9.3.0 up to 9.3.3, 9.4.0a1 up to 9.4.0a6, 9.4.0b1 up to 9.4.0b4, 9.4.0rc1, and 9.5.0a1 (Bind Forum only) allows remote attackers to cause a denial of service (exit) via a type * (ANY) DNS query response that contains multiple RRsets, which triggers an assertion error.

tags | advisory, remote, denial of service
systems | linux, mandriva
advisories | CVE-2007-0493, CVE-2007-0494
SHA-256 | 22104610fef5336817ef5f7591218626c8c9e5e0458b299194943ab75d9d9362

Mandriva Linux Security Advisory 2007.030

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2007:030
https://www.mandriva.com/security/
_______________________________________________________________________

Package : bind
Date : January 30, 2007
Affected: 2006.0, 2007.0, Corporate 3.0, Corporate 4.0,
Multi Network Firewall 2.0
_______________________________________________________________________

Problem Description:

Use-after-free vulnerability in ISC BIND 9.3.0 up to 9.3.3, 9.4.0a1 up
to 9.4.0a6, 9.4.0b1 up to 9.4.0b4, 9.4.0rc1, and 9.5.0a1 (Bind Forum
only) allows remote attackers to cause a denial of service (named
daemon crash) via unspecified vectors that cause named to "dereference
a freed fetch context." (CVE-2007-0493)

ISC BIND 9.0.x, 9.1.x, 9.2.0 up to 9.2.7, 9.3.0 up to 9.3.3, 9.4.0a1 up
to 9.4.0a6, 9.4.0b1 up to 9.4.0b4, 9.4.0rc1, and 9.5.0a1 (Bind Forum
only) allows remote attackers to cause a denial of service (exit) via a
type * (ANY) DNS query response that contains multiple RRsets, which
triggers an assertion error. (CVE-2007-0494)

The updated packages have been patched to correct these issues.
_______________________________________________________________________

References:

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0493
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0494
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2006.0:
136f032a3e607a885e8e758c21de697e 2006.0/i586/bind-9.3.1-4.3.20060mdk.i586.rpm
4ec04765b384832e638fba3ca97958d6 2006.0/i586/bind-devel-9.3.1-4.3.20060mdk.i586.rpm
67b8b8fd0d66d3548e23bc9ea758a9b2 2006.0/i586/bind-utils-9.3.1-4.3.20060mdk.i586.rpm
0478a46a421aaff69a4268fc50311cad 2006.0/SRPMS/bind-9.3.1-4.3.20060mdk.src.rpm

Mandriva Linux 2006.0/X86_64:
dcfcda7ac17daa0e7d1a898d8f018c53 2006.0/x86_64/bind-9.3.1-4.3.20060mdk.x86_64.rpm
114417e447db63eff69f0fb9c1da5ca5 2006.0/x86_64/bind-devel-9.3.1-4.3.20060mdk.x86_64.rpm
822d35d0c359512697b00aa322e229c8 2006.0/x86_64/bind-utils-9.3.1-4.3.20060mdk.x86_64.rpm
0478a46a421aaff69a4268fc50311cad 2006.0/SRPMS/bind-9.3.1-4.3.20060mdk.src.rpm

Mandriva Linux 2007.0:
5dd19eec1e9befd50e04f8f57ef05a14 2007.0/i586/bind-9.3.2-8.2mdv2007.0.i586.rpm
93ee3478554408436542ecca80a057b5 2007.0/i586/bind-devel-9.3.2-8.2mdv2007.0.i586.rpm
0b41cdaf5c5dcb6b22b9e7cbdd176a71 2007.0/i586/bind-utils-9.3.2-8.2mdv2007.0.i586.rpm
2837da2b6e2ad6e8cb633649db7f2f72 2007.0/SRPMS/bind-9.3.2-8.2mdv2007.0.src.rpm

Mandriva Linux 2007.0/X86_64:
bd1f5a957435cfd8b98c9144fdce3e2c 2007.0/x86_64/bind-9.3.2-8.2mdv2007.0.x86_64.rpm
2eaff9073641cdbb1728b93b8d47466e 2007.0/x86_64/bind-devel-9.3.2-8.2mdv2007.0.x86_64.rpm
65e0b300358077a40491c0050a6018c3 2007.0/x86_64/bind-utils-9.3.2-8.2mdv2007.0.x86_64.rpm
2837da2b6e2ad6e8cb633649db7f2f72 2007.0/SRPMS/bind-9.3.2-8.2mdv2007.0.src.rpm

Corporate 3.0:
0c4cb30dfc9859166b17a31e6a2af79d corporate/3.0/i586/bind-9.2.3-6.3.C30mdk.i586.rpm
ac37b03dc288e261da1fa6a6345dd8dd corporate/3.0/i586/bind-devel-9.2.3-6.3.C30mdk.i586.rpm
079bae6b9f8068d74e072be65d26fa77 corporate/3.0/i586/bind-utils-9.2.3-6.3.C30mdk.i586.rpm
be1255c5555729ddc5ae14c4f67cf567 corporate/3.0/SRPMS/bind-9.2.3-6.3.C30mdk.src.rpm

Corporate 3.0/X86_64:
7e73fd8282c1a7953be0b744beed5dd3 corporate/3.0/x86_64/bind-9.2.3-6.3.C30mdk.x86_64.rpm
8902b055a92d2e13e71b823cb3e4a608 corporate/3.0/x86_64/bind-devel-9.2.3-6.3.C30mdk.x86_64.rpm
fcdf343dd8701efa433d64aaeddffcab corporate/3.0/x86_64/bind-utils-9.2.3-6.3.C30mdk.x86_64.rpm
be1255c5555729ddc5ae14c4f67cf567 corporate/3.0/SRPMS/bind-9.2.3-6.3.C30mdk.src.rpm

Corporate 4.0:
068c39ca2498b053ad23e08fdb31c54e corporate/4.0/i586/bind-9.3.2-7.2.20060mlcs4.i586.rpm
c99b3f41d2ca96f615bc26f0e8c169f9 corporate/4.0/i586/bind-devel-9.3.2-7.2.20060mlcs4.i586.rpm
c76a8f92ae138cff33e3dc6fef10ff90 corporate/4.0/i586/bind-utils-9.3.2-7.2.20060mlcs4.i586.rpm
765808e7773555373806de92a7f9457d corporate/4.0/SRPMS/bind-9.3.2-7.2.20060mlcs4.src.rpm

Corporate 4.0/X86_64:
3faee03ce5afe127873cccd06ff2db08 corporate/4.0/x86_64/bind-9.3.2-7.2.20060mlcs4.x86_64.rpm
33fffd8bfdba90e241651572c0bfc9c5 corporate/4.0/x86_64/bind-devel-9.3.2-7.2.20060mlcs4.x86_64.rpm
d934cd748f381f2e3b0b9f64557abf23 corporate/4.0/x86_64/bind-utils-9.3.2-7.2.20060mlcs4.x86_64.rpm
765808e7773555373806de92a7f9457d corporate/4.0/SRPMS/bind-9.3.2-7.2.20060mlcs4.src.rpm

Multi Network Firewall 2.0:
0a3fe311cabb513919db7732cb6acaf7 mnf/2.0/i586/bind-9.2.3-6.3.M20mdk.i586.rpm
503e3482f93a90c25540cbe1b00328b0 mnf/2.0/i586/bind-devel-9.2.3-6.3.M20mdk.i586.rpm
4f0c2e87628bd66fe88daddc5e5c9c41 mnf/2.0/i586/bind-utils-9.2.3-6.3.M20mdk.i586.rpm
f8abc9e26c5ae868793741a1552d622e mnf/2.0/SRPMS/bind-9.2.3-6.3.M20mdk.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

https://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFFv5WJmqjQ0CJFipgRAkNvAKDCYPL7wX8/14BumOwVPYVfihuVhACg01FS
HT6Qr3arS3FWBkmzvAUnCa4=
=cv5V
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close