USN-706-1: Bind vulnerability

09 January 2009

Bind vulnerability

Releases

Packages

  • bind9 -

Details

It was discovered that Bind did not properly perform signature verification.
When DNSSEC with DSA signatures are in use, a remote attacker could exploit
this to bypass signature validation to spoof DNS entries and poison DNS
caches. Among other things, this could lead to misdirected email and web
traffic.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 8.10
Ubuntu 8.04
Ubuntu 7.10
Ubuntu 6.06

In general, a standard system upgrade is sufficient to effect the
necessary changes.

References