Your submission was sent successfully! Close

USN-343-1: bind9 vulnerabilities

8 September 2006

bind9 vulnerabilities

Releases

Details

bind did not sufficiently verify particular requests and responses
from other name servers and users. By sending a specially crafted
packet, a remote attacker could exploit this to crash the name server.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 6.06
  • bind9 - 1:9.3.2-2ubuntu1.1
Ubuntu 5.10
  • bind9 - 1:9.3.1-2ubuntu1.1
Ubuntu 5.04
  • bind9 - 1:9.2.4-1ubuntu1.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.