Ubuntu Security Notice USN-3346-1
29th June, 2017
bind9 vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 17.04
- Ubuntu 16.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary
Bind could be made to serve incorrect information or expose sensitive information over the network.
Software description
- bind9 - Internet Domain Name Server
Details
Clément Berthaux discovered that Bind did not correctly check TSIG
authentication for zone update requests. An attacker could use this
to improperly perform zone updates. (CVE-2017-3143)
Clément Berthaux discovered that Bind did not correctly check TSIG
authentication for zone transfer requests. An attacker could use this
to improperly transfer entire zones. (CVE-2017-3142)
Update instructions
The problem can be corrected by updating your system to the following package version:
- Ubuntu 17.04:
- bind9 1:9.10.3.dfsg.P4-10.1ubuntu5.1
- Ubuntu 16.10:
- bind9 1:9.10.3.dfsg.P4-10.1ubuntu1.7
- Ubuntu 16.04 LTS:
- bind9 1:9.10.3.dfsg.P4-8ubuntu1.7
- Ubuntu 14.04 LTS:
- bind9 1:9.9.5.dfsg-3ubuntu0.15
To update your system, please follow these instructions: http://ift.tt/17VXqjU.
After a standard system update you need to restart Bind to make
all the necessary changes.
References
from Ubuntu Security Notices http://ift.tt/2tviqzM
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.