Red Hat Customer Portal

Skip to main content

Security Advisory bind security update

Advisory: RHSA-2002:119-12
Type: Security Advisory
Severity: Important
Issued on: 2002-06-20
Last updated on: 2002-07-29
Affected Products: Red Hat Enterprise Linux AS (v. 2.1)
CVEs (cve.mitre.org): CVE-2002-0400
CVE-2002-0651

Details

Version 9 of ISC BIND, prior to version 9.2.1, contained a denial of
service (DoS) attack vulnerability. Various versions of the ISC BIND
resolver libraries are vulnerable to a buffer overflow attack.

ISC BIND (Berkeley Internet Name Domain) is an implementation of the DNS
(Domain Name System) protocols. BIND includes a DNS server (named) --
which resolves hostnames to IP addresses, a resolver library
(routines for applications to use when interfacing with DNS), and
various tools.

Versions of BIND 9 prior to 9.2.1 have a bug that causes certain requests
to the BIND name server to fail an internal consistency check, causing the
name server to stop responding to requests. This can be used by a remote
attacker to cause a denial of service (DoS) attack against name servers.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2002-0400 to this issue.

A buffer overflow vulnerability exists in multiple implementations of DNS
resolver libraries. Applications that utilize vulnerable DNS resolver
libraries may be affected. A remote attacker who is able to send malicious
DNS responses could potentially exploit this vulnerability to execute
arbitrary code or cause a denial of service (DoS) attack on a vulnerable
system. Red Hat Linux does not ship with any applications or libraries that
link against the BIND resolver libraries; however, third party code may be
affected. (CAN-2002-0651)

Red Hat Linux Advanced Server shipped with a version of ISC BIND vulnerable
to both of these issues. All users of BIND are advised to upgrade to the
errata packages containing BIND 9.2.1 which contains backported patches
that correct these issues.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

Please note that this update is available via Red Hat Network. To use Red
Hat Network, launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

Updated packages

Red Hat Enterprise Linux AS (v. 2.1)

SRPMS:
bind-9.2.1-1.7x.2.src.rpm
File outdated by:  RHSA-2009:0020
    MD5: 56834b83e090ac25583e7b417c9ecef0
bind-9.2.1-1.7x.2.src.rpm
File outdated by:  RHSA-2009:0020
    MD5: 56834b83e090ac25583e7b417c9ecef0
 
IA-32:
bind-9.2.1-1.7x.2.i386.rpm
File outdated by:  RHSA-2009:0020
    MD5: 8636bdf02a5c862a8e7773447ced2a4c
bind-devel-9.2.1-1.7x.2.i386.rpm
File outdated by:  RHSA-2009:0020
    MD5: 35007eaef20eb645d6ca7c3e02cb10d8
bind-utils-9.2.1-1.7x.2.i386.rpm
File outdated by:  RHSA-2009:0020
    MD5: b467c81cea2c6653df6bc816401b598c
 
(The unlinked packages above are only available from the Red Hat Network)

References


Keywords

bind, buffer, consistency, DoS, libbind, overflow, srv


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/