USN-622-1: Bind vulnerability

Ubuntu Security Notice USN-622-1

8th July, 2008

bind9 vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 8.04 LTS
  • Ubuntu 7.10
  • Ubuntu 7.04
  • Ubuntu 6.06 LTS

Software description

  • bind9

Details

Dan Kaminsky discovered weaknesses in the DNS protocol as implemented
by Bind. A remote attacker could exploit this to spoof DNS entries and
poison DNS caches. Among other things, this could lead to misdirected
email and web traffic.

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 8.04 LTS:
libdns35 1:9.4.2-10ubuntu0.1
Ubuntu 7.10:
libdns32 1:9.4.1-P1-3ubuntu2
Ubuntu 7.04:
libdns22 1:9.3.4-2ubuntu2.3
Ubuntu 6.06 LTS:
libdns21 1:9.3.2-2ubuntu1.5

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system upgrade is sufficient to effect the
necessary changes.

References

CVE-2008-1447