Trustix Secure Linux Information for VU#734644

ISC BIND 8 vulnerable to cache poisoning via negative responses

Status

Affected

Vendor Statement

Please see http://www.trustix.org/errata/misc/2003/TSL-2003-0044-bind.asc.txt

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Vendor References

None

Addendum

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Trustix Secure Linux Security Advisory #2003-0044

Package name:      bind
Summary:           negative cache sec. fix
Date:              2003-11-27
Affected versions: TSL 1.2, 1.5

- --------------------------------------------------------------------------
Package description:

BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain
Name System) protocols. BIND includes a DNS server (named), which resolves
host names to IP addresses, and a resolver library (routines for applications
to use when interfacing with DNS). A DNS server allows clients to name
resources or objects and share the information with other network machines.
The named DNS server can be used on workstations as a caching name server,
but is generally only needed on one machine for an entire network. Note that
the configuration files for making BIND act as a simple caching nameserver
are included in the caching-nameserver package.Install the bind package if
you need a DNS server for your network. If you want bind to act a caching
name server, you will also need to install the caching-nameserver package.


Problem description:
According the the bind announcment dated Thu, 27 Nov 2003, the new upstream
bind 8.3.7 fixes a security problem:


Security Fix: Negative Cache Poison Fix.

This issue has been addressed in these updates.


Action:
We recommend that all systems with this package installed be upgraded.
Please note that if you do not need the functionality provided by this
package, you may want to remove it from your system.



Location:
All TSL updates are available from
<URI:
http://http.trustix.org/pub/trustix/updates/>
<URI:
ftp://ftp.trustix.org/pub/trustix/updates/>


About Trustix Secure Linux:
Trustix Secure Linux is a small Linux distribution for servers. With focus
on security and stability, the system is painlessly kept safe and up to
date from day one using swup, the automated software updater.



Automatic updates:
Users of the SWUP tool can enjoy having updates automatically
installed using 'swup --upgrade'.



Public testing:
These packages have been available for public testing for some time.
If you want to contribute by testing the various packages in the
testing tree, please feel free to share your findings on the
tsl-discuss mailinglist.
The testing tree is located at
<URI:
http://tsldev.trustix.org/cloud/>

You may also use swup for public testing of updates:

site {
class = 0
location = "
http://tsldev.trustix.org/cloud/rdfs/latest.rdf"
regexp = ".*"

}


Questions?
Check out our mailing lists:
<URI:
http://www.trustix.org/support/>


Verification:
This advisory along with all TSL packages are signed with the TSL sign key.
This key is available from:
<URI:
http://www.trustix.org/TSL-SIGN-KEY>

The advisory itself is available from the errata pages at
<URI:
http://www.trustix.org/errata/trustix-1.2/> and
<URI:
http://www.trustix.org/errata/trustix-1.5/>
or directly at
<URI:
http://www.trustix.org/errata/misc/2003/TSL-2003-0044-bind.asc.txt>


MD5sums of the packages:
- --------------------------------------------------------------------------
0e109cf7c3ec04f6adfbd3dddcbc94d3  ./1.5/srpms/bind-8.2.6-3tr.src.rpm
b353b0517f50b18c6f2bb180151ad671  ./1.5/rpms/bind-utils-8.2.6-3tr.i586.rpm
872ed56a159fa9e8404e30c6f6afdce0  ./1.5/rpms/bind-devel-8.2.6-3tr.i586.rpm
ade76318032b7a95f2426edcf10e75a8  ./1.5/rpms/bind-8.2.6-3tr.i586.rpm
0e109cf7c3ec04f6adfbd3dddcbc94d3  ./1.2/srpms/bind-8.2.6-3tr.src.rpm
dd01d1afce4afd60b08857706f2150ee  ./1.2/rpms/bind-utils-8.2.6-3tr.i586.rpm
590118f78a8cddbaf8dc8c142ef57cb3  ./1.2/rpms/bind-devel-8.2.6-3tr.i586.rpm
ca631fbe974a6926c8ba32b46c3ac7d4  ./1.2/rpms/bind-8.2.6-3tr.i586.rpm
- --------------------------------------------------------------------------


TSL Security Team

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE/xcQCi8CEzsK9IksRArTyAKCpbt7Z0zr7l/liVtKbiuGOQjBBXACgk74q
RpVcOV3YngzwUxZcJLdDuls=
=PazY
-----END PGP SIGNATURE-----

If you have feedback, comments, or additional information about this vulnerability, please send us email.