USN-1910-1: Bind vulnerability

Ubuntu Security Notice USN-1910-1

29th July, 2013

bind9 vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 13.04
  • Ubuntu 12.10
  • Ubuntu 12.04 LTS
  • Ubuntu 10.04 LTS

Summary

Bind could be made to crash if it received specially crafted network traffic.

Software description

  • bind9 - Internet Domain Name Server

Details

Maxim Shudrak discovered that Bind incorrectly handled certain malformed
rdata. A remote attacker could use this flaw with a specially crafted
query to cause Bind to stop responding, resulting in a denial of service.

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 13.04:
bind9 1:9.9.2.dfsg.P1-2ubuntu2.1
libdns95 1:9.9.2.dfsg.P1-2ubuntu2.1
Ubuntu 12.10:
bind9 1:9.8.1.dfsg.P1-4.2ubuntu3.3
libdns81 1:9.8.1.dfsg.P1-4.2ubuntu3.3
Ubuntu 12.04 LTS:
bind9 1:9.8.1.dfsg.P1-4ubuntu0.7
libdns81 1:9.8.1.dfsg.P1-4ubuntu0.7
Ubuntu 10.04 LTS:
libdns64 1:9.7.0.dfsg.P1-1ubuntu0.10
bind9 1:9.7.0.dfsg.P1-1ubuntu0.10

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2013-4854