Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT Security Bulletin ASB-2010.0170 Internet Systems Consortium (ISC) have released an update to BIND 9.7.1 16 July 2010 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: BIND 9.7.1-P1 BIND 9.7.1 Operating System: Windows UNIX variants (UNIX, Linux, OSX) Impact/Access: Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2010-0213 Member content until: Sunday, August 15 2010 Comment: Note that 9.7.0-P2 is NOT impacted by this vulnerability. OVERVIEW Internet Systems Consortium (ISC) have released an update to BIND 9.7.1. This update (9.7.1-P2) includes security fixes. [1] IMPACT The vulnerability is in the code that handles queries for the "RRSIG" record type. Under certain conditions the query may cause the server to enter a loop that keeps sending RRSIG queries to the authoritative server for the queried name. According to ISC, this is only triggered when "the server has one or more trust anchors configured statically and/or via DLV, then if the answer is not already in cache". [1] MITIGATION ISC has released BIND 9.7.1-P2 that corrects this vulnerability. [2] They have not listed any workarounds, so if you are running BIND 9.7.1 you are encouraged to upgrade. [1] REFERENCES [1] RRSIG query handling bug in BIND 9.7.1 http://www.isc.org/software/bind/advisories/cve-2010-0213 [2] BIND 9.7.1-P2 http://www.isc.org/software/bind/971-p2 AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iD8DBQFMP7Cf/iFOrG6YcBERAtrDAJ0XGSINuA0VoohxtLNNOW7LZ+Yc0wCgmhlJ 2/K93vAQaJ8N6m5vli7Qfqw= =O9Xf -----END PGP SIGNATURE-----