| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: another root exploit in BIND |
From: Jeff Shultz
I'm guessing that this doesn't affect BIND 9 at all. At least they don't mention it.
On Sat, 21 Dec 2002 22:16:13 -0500, "Geo." wrote:
>To: bugtraq{at}securityfocus.com announce{at}lists.caldera.com
>security-alerts{at}linuxsecurity.com full-disclosure{at}lists.netsys.com
>
>____________________________________________________________________________
>__
>
> SCO Security Advisory
>
>Subject: Linux: multiple vulnerabilities in BIND (CERT CA-2002-31)
>Advisory number: CSSA-2002-059.0
>Issue date: 2002 December 19
>Cross reference:
>____________________________________________________________________________
>__
>
>
>1. Problem Description
>
> From CERT CA-2002-31:
>
> Multiple vulnerabilities have been found in BIND (Berkeley
> Internet Name Domain).
>
> One of these vulnerabilities may allow remote attackers to
> execute arbitrary code with the privileges of the user running
> named, typically root.
>
> Other vulnerabilities may allow remote attackers to disrupt
> the normal operation of your name server, possibly causing a
> crash.
>
> A vulnerability in the DNS resolver library may allow remote
> attackers to execute arbitrary code with the privileges of
> applications that issue network name or address requests.
>
>
>2. Vulnerable Supported Versions
>
> System Package
> ----------------------------------------------------------------------
>
> OpenLinux 3.1.1 Server prior to bind-8.3.4-1.i386.rpm
> prior to bind-doc-8.3.4-1.i386.rpm
> prior to bind-utils-8.3.4-1.i386.rpm
>
> OpenLinux 3.1.1 Workstation prior to bind-8.3.4-1.i386.rpm
> prior to bind-doc-8.3.4-1.i386.rpm
> prior to bind-utils-8.3.4-1.i386.rpm
>
> OpenLinux 3.1 Server prior to bind-8.3.4-1.i386.rpm
> prior to bind-doc-8.3.4-1.i386.rpm
> prior to bind-utils-8.3.4-1.i386.rpm
>
> OpenLinux 3.1 Workstation prior to bind-8.3.4-1.i386.rpm
> prior to bind-doc-8.3.4-1.i386.rpm
> prior to bind-utils-8.3.4-1.i386.rpm
>
>
>3. Solution
>
> The proper solution is to install the latest packages. Many
> customers find it easier to use the Caldera System Updater, called
> cupdate (or kcupdate under the KDE environment), to update these
> packages rather than downloading and installing them by hand.
>
>
>4. OpenLinux 3.1.1 Server
>
> 4.1 Package Location
>
> ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2002-059.0/RPMS
>
> 4.2 Packages
>
> dbade93f9de80c9d05dafdb010c51f0f bind-8.3.4-1.i386.rpm
> 077c5888f3c3f3074bcb12c79c9c97ec bind-doc-8.3.4-1.i386.rpm
> dfad9dd9bea8a88ba1958e68b6b255a7 bind-utils-8.3.4-1.i386.rpm
>
> 4.3 Installation
>
> rpm -Fvh bind-8.3.4-1.i386.rpm
> rpm -Fvh bind-doc-8.3.4-1.i386.rpm
> rpm -Fvh bind-utils-8.3.4-1.i386.rpm
>
> 4.4 Source Package Location
>
> ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2002-059.0/SRPMS
>
> 4.5 Source Packages
>
> 73b4995cc2c66829aca6e2e181b1de2f bind-8.3.4-1.src.rpm
>
>
>5. OpenLinux 3.1.1 Workstation
>
> 5.1 Package Location
>
>
>ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Workstation/CSSA-2002-059.0/RP
>MS
>
> 5.2 Packages
>
> 0816f38b7ffacae029944eefae8a6fef bind-8.3.4-1.i386.rpm
> 0b514bae1d74d281969b55b9e84e9056 bind-doc-8.3.4-1.i386.rpm
> 328c16be821f03f048701072bea4c290 bind-utils-8.3.4-1.i386.rpm
>
> 5.3 Installation
>
> rpm -Fvh bind-8.3.4-1.i386.rpm
> rpm -Fvh bind-doc-8.3.4-1.i386.rpm
> rpm -Fvh bind-utils-8.3.4-1.i386.rpm
>
> 5.4 Source Package Location
>
>
>ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Workstation/CSSA-2002-059.0/SR
>PMS
>
> 5.5 Source Packages
>
> 763945e1c5e05dfa2146f2acb6725556 bind-8.3.4-1.src.rpm
>
>
>6. OpenLinux 3.1 Server
>
> 6.1 Package Location
>
> ftp://ftp.sco.com/pub/updates/OpenLinux/3.1/Server/CSSA-2002-059.0/RPMS
>
> 6.2 Packages
>
> 89d9ba24ca8adcc2e6e791abea0f5df4 bind-8.3.4-1.i386.rpm
> ba283adcfc05258e3721d0ca579f47b1 bind-doc-8.3.4-1.i386.rpm
> 82b68b5152da23bcc376ae2514a75f14 bind-utils-8.3.4-1.i386.rpm
>
> 6.3 Installation
>
> rpm -Fvh bind-8.3.4-1.i386.rpm
> rpm -Fvh bind-doc-8.3.4-1.i386.rpm
> rpm -Fvh bind-utils-8.3.4-1.i386.rpm
>
> 6.4 Source Package Location
>
> ftp://ftp.sco.com/pub/updates/OpenLinux/3.1/Server/CSSA-2002-059.0/SRPMS
>
> 6.5 Source Packages
>
> ddd2198ec937e0ba50313c595f08817b bind-8.3.4-1.src.rpm
>
>
>7. OpenLinux 3.1 Workstation
>
> 7.1 Package Location
>
>
>ftp://ftp.sco.com/pub/updates/OpenLinux/3.1/Workstation/CSSA-2002-059.0/RPMS
>
> 7.2 Packages
>
> 7c263440991263144153d218d458e7ff bind-8.3.4-1.i386.rpm
> 1d5a28636c90eea847fbad88d966ac6c bind-doc-8.3.4-1.i386.rpm
> 1543644de1b99e07aaa32b50342d8105 bind-utils-8.3.4-1.i386.rpm
>
> 7.3 Installation
>
> rpm -Fvh bind-8.3.4-1.i386.rpm
> rpm -Fvh bind-doc-8.3.4-1.i386.rpm
> rpm -Fvh bind-utils-8.3.4-1.i386.rpm
>
> 7.4 Source Package Location
>
>
>ftp://ftp.sco.com/pub/updates/OpenLinux/3.1/Workstation/CSSA-2002-059.0/SRPM
>S
>
> 7.5 Source Packages
>
> 09918127df81de1874ec96628bf45695 bind-8.3.4-1.src.rpm
>
>
>8. References
>
> Specific references for this advisory:
>
> http://www.cert.org/advisories/CA-2002-31.html
> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1219
> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1220
> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1221
>
> SCO security resources:
>
> http://www.sco.com/support/security/index.html
>
> This security fix closes SCO incidents sr871561, fz526618,
> erg712159.
>
>
>9. Disclaimer
>
> SCO is not responsible for the misuse of any of the information
> we provide on this website and/or through our security
> advisories. Our advisories are a service to our customers intended
> to promote secure installation and use of SCO products.
>
>____________________________________________________________________________
>__
>
--- BBBS/NT v4.01 Flag-4
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/1.45)SEEN-BY: 633/267 270 @PATH: 379/1 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.