USN-491-1: Bind vulnerability

25 July 2007

Bind vulnerability

Releases

Details

A flaw was discovered in Bind's sequence number generator. A remote
attacker could calculate future sequence numbers and send forged DNS
query responses. This could lead to client connections being directed
to attacker-controlled hosts, resulting in credential theft and other
attacks.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 7.04
  • libdns22 - 1:9.3.4-2ubuntu2.1
Ubuntu 6.10
  • libdns21 - 1:9.3.2-2ubuntu3.2
Ubuntu 6.06
  • libdns21 - 1:9.3.2-2ubuntu1.3

In general, a standard system upgrade is sufficient to effect the
necessary changes.

References