USN-1910-1: Bind vulnerability

29 July 2013

bind9 vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 13.04
  • Ubuntu 12.10
  • Ubuntu 12.04 LTS
  • Ubuntu 10.04 LTS

Summary

Bind could be made to crash if it received specially crafted network traffic.

Software Description

  • bind9 - Internet Domain Name Server

Details

Maxim Shudrak discovered that Bind incorrectly handled certain malformed rdata. A remote attacker could use this flaw with a specially crafted query to cause Bind to stop responding, resulting in a denial of service.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 13.04
bind9 - 1:9.9.2.dfsg.P1-2ubuntu2.1
libdns95 - 1:9.9.2.dfsg.P1-2ubuntu2.1
Ubuntu 12.10
bind9 - 1:9.8.1.dfsg.P1-4.2ubuntu3.3
libdns81 - 1:9.8.1.dfsg.P1-4.2ubuntu3.3
Ubuntu 12.04 LTS
bind9 - 1:9.8.1.dfsg.P1-4ubuntu0.7
libdns81 - 1:9.8.1.dfsg.P1-4ubuntu0.7
Ubuntu 10.04 LTS
bind9 - 1:9.7.0.dfsg.P1-1ubuntu0.10
libdns64 - 1:9.7.0.dfsg.P1-1ubuntu0.10

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References