USN-865-1: Bind vulnerability

07 December 2009

Bind vulnerability

Releases

Packages

  • bind9 -

Details

Michael Sinatra discovered that Bind did not correctly validate certain
records added to its cache. When DNSSEC validation is in use, a remote
attacker could exploit this to spoof DNS entries and poison DNS caches.
Among other things, this could lead to misdirected email and web traffic.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 9.10
Ubuntu 9.04
Ubuntu 8.10
Ubuntu 8.04
Ubuntu 6.06

In general, a standard system upgrade is sufficient to effect the
necessary changes.

References

Related notices

  • USN-888-1: libdns53, libdns23, libdns46, bind9, libdns36, libdns44