PDA

Bekijk Volledige Versie : Security Update: [CSSA-2002-059.0] Linux: multiple vulnerabilities in BIND (CERT CA-2002-31)



security@caldera.com
21/12/02, 06:37
--W/nzBZO5zC0uMSeA
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

To: bugtraq@securityfocus.com announce@lists.caldera.com security-alerts@linuxsecurity.com full-disclosure@lists.netsys.com

__________________________________________________ ____________________________

SCO Security Advisory

Subject: Linux: multiple vulnerabilities in BIND (CERT CA-2002-31)
Advisory number: CSSA-2002-059.0
Issue date: 2002 December 19
Cross reference:
__________________________________________________ ____________________________


1. Problem Description

From CERT CA-2002-31:

Multiple vulnerabilities have been found in BIND (Berkeley
Internet Name Domain).

One of these vulnerabilities may allow remote attackers to
execute arbitrary code with the privileges of the user running
named, typically root.

Other vulnerabilities may allow remote attackers to disrupt
the normal operation of your name server, possibly causing a
crash.

A vulnerability in the DNS resolver library may allow remote
attackers to execute arbitrary code with the privileges of
applications that issue network name or address requests.


2. Vulnerable Supported Versions

System Package
----------------------------------------------------------------------

OpenLinux 3.1.1 Server prior to bind-8.3.4-1.i386.rpm
prior to bind-doc-8.3.4-1.i386.rpm
prior to bind-utils-8.3.4-1.i386.rpm

OpenLinux 3.1.1 Workstation prior to bind-8.3.4-1.i386.rpm
prior to bind-doc-8.3.4-1.i386.rpm
prior to bind-utils-8.3.4-1.i386.rpm

OpenLinux 3.1 Server prior to bind-8.3.4-1.i386.rpm
prior to bind-doc-8.3.4-1.i386.rpm
prior to bind-utils-8.3.4-1.i386.rpm

OpenLinux 3.1 Workstation prior to bind-8.3.4-1.i386.rpm
prior to bind-doc-8.3.4-1.i386.rpm
prior to bind-utils-8.3.4-1.i386.rpm


3. Solution

The proper solution is to install the latest packages. Many
customers find it easier to use the Caldera System Updater, called
cupdate (or kcupdate under the KDE environment), to update these
packages rather than downloading and installing them by hand.


4. OpenLinux 3.1.1 Server

4.1 Package Location

ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2002-059.0/RPMS

4.2 Packages

dbade93f9de80c9d05dafdb010c51f0f bind-8.3.4-1.i386.rpm
077c5888f3c3f3074bcb12c79c9c97ec bind-doc-8.3.4-1.i386.rpm
dfad9dd9bea8a88ba1958e68b6b255a7 bind-utils-8.3.4-1.i386.rpm

4.3 Installation

rpm -Fvh bind-8.3.4-1.i386.rpm
rpm -Fvh bind-doc-8.3.4-1.i386.rpm
rpm -Fvh bind-utils-8.3.4-1.i386.rpm

4.4 Source Package Location

ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2002-059.0/SRPMS

4.5 Source Packages

73b4995cc2c66829aca6e2e181b1de2f bind-8.3.4-1.src.rpm


5. OpenLinux 3.1.1 Workstation

5.1 Package Location

ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Workstation/CSSA-2002-059.0/RPMS

5.2 Packages

0816f38b7ffacae029944eefae8a6fef bind-8.3.4-1.i386.rpm
0b514bae1d74d281969b55b9e84e9056 bind-doc-8.3.4-1.i386.rpm
328c16be821f03f048701072bea4c290 bind-utils-8.3.4-1.i386.rpm

5.3 Installation

rpm -Fvh bind-8.3.4-1.i386.rpm
rpm -Fvh bind-doc-8.3.4-1.i386.rpm
rpm -Fvh bind-utils-8.3.4-1.i386.rpm

5.4 Source Package Location

ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Workstation/CSSA-2002-059.0/SRPMS

5.5 Source Packages

763945e1c5e05dfa2146f2acb6725556 bind-8.3.4-1.src.rpm


6. OpenLinux 3.1 Server

6.1 Package Location

ftp://ftp.sco.com/pub/updates/OpenLinux/3.1/Server/CSSA-2002-059.0/RPMS

6.2 Packages

89d9ba24ca8adcc2e6e791abea0f5df4 bind-8.3.4-1.i386.rpm
ba283adcfc05258e3721d0ca579f47b1 bind-doc-8.3.4-1.i386.rpm
82b68b5152da23bcc376ae2514a75f14 bind-utils-8.3.4-1.i386.rpm

6.3 Installation

rpm -Fvh bind-8.3.4-1.i386.rpm
rpm -Fvh bind-doc-8.3.4-1.i386.rpm
rpm -Fvh bind-utils-8.3.4-1.i386.rpm

6.4 Source Package Location

ftp://ftp.sco.com/pub/updates/OpenLinux/3.1/Server/CSSA-2002-059.0/SRPMS

6.5 Source Packages

ddd2198ec937e0ba50313c595f08817b bind-8.3.4-1.src.rpm


7. OpenLinux 3.1 Workstation

7.1 Package Location

ftp://ftp.sco.com/pub/updates/OpenLinux/3.1/Workstation/CSSA-2002-059.0/RPMS

7.2 Packages

7c263440991263144153d218d458e7ff bind-8.3.4-1.i386.rpm
1d5a28636c90eea847fbad88d966ac6c bind-doc-8.3.4-1.i386.rpm
1543644de1b99e07aaa32b50342d8105 bind-utils-8.3.4-1.i386.rpm

7.3 Installation

rpm -Fvh bind-8.3.4-1.i386.rpm
rpm -Fvh bind-doc-8.3.4-1.i386.rpm
rpm -Fvh bind-utils-8.3.4-1.i386.rpm

7.4 Source Package Location

ftp://ftp.sco.com/pub/updates/OpenLinux/3.1/Workstation/CSSA-2002-059.0/SRPMS

7.5 Source Packages

09918127df81de1874ec96628bf45695 bind-8.3.4-1.src.rpm


8. References

Specific references for this advisory:

http://www.cert.org/advisories/CA-2002-31.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1219
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1220
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1221

SCO security resources:

http://www.sco.com/support/security/index.html

This security fix closes SCO incidents sr871561, fz526618,
erg712159.


9. Disclaimer

SCO is not responsible for the misuse of any of the information
we provide on this website and/or through our security
advisories. Our advisories are a service to our customers intended
to promote secure installation and use of SCO products.

__________________________________________________ ____________________________

--W/nzBZO5zC0uMSeA
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (SCO_SV)
Comment: For info see http://www.gnupg.org

iEYEARECAAYFAj4CYaQACgkQbluZssSXDTFARwCgq20NOMW9oo fGqmwwVacXOMCU
yloAnjSdRvTsBLnS9j78pYk3miRi7fQp
=TTdZ
-----END PGP SIGNATURE-----

--W/nzBZO5zC0uMSeA--