Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2012-1033

Published: 8 February 2012

The resolver in ISC BIND 9 through 9.8.1-P1 overwrites cached server names and TTL values in NS records during the processing of a response to an A record query, which allows remote attackers to trigger continued resolvability of revoked domain names via a "ghost domain names" attack.

Notes

AuthorNote
mdeslaur
upstream advisory says they won't be releasing a fix for this
dns-sec is the workaround.
upstream apparently included the fix anyway:
3282. [bug] Restrict the TTL of NS RRset to no more than that
of the old NS RRset when replacing it.
[RT #27792] [RT #27884]

Priority

Low

Status

Package Release Status
bind9
Launchpad, Ubuntu, Debian
hardy
Released (1:9.4.2.dfsg.P2-2ubuntu0.10)
lucid
Released (1:9.7.0.dfsg.P1-1ubuntu0.5)
maverick Ignored
(reached end-of-life)
natty
Released (1:9.7.3.dfsg-1ubuntu2.4)
oneiric
Released (1:9.7.3.dfsg-1ubuntu4.2)
precise
Released (1:9.8.1.dfsg.P1-4ubuntu0.1)
upstream
Released (9.6-ESV-R6,9.7.5,9.8.2)