Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2008.0529 -- [RedHat] Moderate: bind security, bug fix, and enhancement update 22 May 2008 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: bind Publisher: Red Hat Operating System: Red Hat Linux 5 Impact: Execute Arbitrary Code/Commands Access Privileged Data Access: Remote/Unauthenticated Existing Account CVE Names: CVE-2008-0122 CVE-2007-6283 Ref: ESB-2008.0404 Original Bulletin: https://rhn.redhat.com/errata/RHSA-2008-0300.html Comment: This advisory covers two vulnerabilities. The first (CVE-2007-6283) requires local access for exploitation. The second vulnerability (CVE-2008-0122) has been covered in the previous AusCERT bulletin: ESB-2008.0404. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: bind security, bug fix, and enhancement update Advisory ID: RHSA-2008:0300-02 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2008-0300.html Issue date: 2008-05-20 Updated on: 2008-05-21 Keywords: gss-tsig lsb sdb CVE Names: CVE-2007-6283 CVE-2008-0122 ===================================================================== 1. Summary: Updated bind packages that fix two security issues, several bugs, and add enhancements are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 3. Description: The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. It was discovered that the bind packages created the "rndc.key" file with insecure file permissions. This allowed any local user to read the content of this file. A local user could use this flaw to control some aspects of the named daemon by using the rndc utility, for example, stopping the named daemon. This problem did not affect systems with the bind-chroot package installed. (CVE-2007-6283) A buffer overflow flaw was discovered in the "inet_network()" function, as implemented by libbind. An attacker could use this flaw to crash an application calling this function, with an argument provided from an untrusted source. (CVE-2008-0122) As well, these updated packages fix the following bugs: * when using an LDAP backend, missing function declarations caused segmentation faults, due to stripped pointers on machines where pointers are longer than integers. * starting named may have resulted in named crashing, due to a race condition during D-BUS connection initialization. This has been resolved in these updated packages. * the named init script returned incorrect error codes, causing the "status" command to return an incorrect status. In these updated packages, the named init script is Linux Standard Base (LSB) compliant. * in these updated packages, the "rndc [command] [zone]" command, where [command] is an rndc command, and [zone] is the specified zone, will find the [zone] if the zone is unique to all views. * the default named log rotation script did not work correctly when using the bind-chroot package. In these updated packages, installing bind-chroot creates the symbolic link "/var/log/named.log", which points to "/var/named/chroot/var/log/named.log", which resolves this issue. * a previous bind update incorrectly changed the permissions on the "/etc/openldap/schema/dnszone.schema" file to mode 640, instead of mode 644, which resulted in OpenLDAP not being able to start. In these updated packages, the permissions are correctly set to mode 644. * the "checkconfig" parameter was missing in the named usage report. For example, running the "service named" command did not return "checkconfig" in the list of available options. * due to a bug in the named init script not handling the rndc return value correctly, the "service named stop" and "service named restart" commands failed on certain systems. * the bind-chroot spec file printed errors when running the "%pre" and "%post" sections. Errors such as the following occurred: Locating //etc/named.conf failed: [FAILED] This has been resolved in these updated packages. * installing the bind-chroot package creates a "/dev/random" file in the chroot environment; however, the "/dev/random" file had an incorrect SELinux label. Starting named resulted in an 'avc: denied { getattr } for pid=[pid] comm="named" path="/dev/random"' error being logged. The "/dev/random" file has the correct SELinux label in these updated packages. * in certain situations, running the "bind +trace" command resulted in random segmentation faults. As well, these updated packages add the following enhancements: * support has been added for GSS-TSIG (RFC 3645). * the "named.root" file has been updated to reflect the new address for L.ROOT-SERVERS.NET. * updates BIND to the latest 9.3 maintenance release. All users of bind are advised to upgrade to these updated packages, which resolve these issues and add these enhancements. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188 5. Bugs fixed (http://bugzilla.redhat.com/): 240788 - bind_sdb, ldap2zone segfaulting 240876 - bind crashes on restart and also when running without forwarders 242734 - Wrong init script 247486 - bind-chroot does not modify /etc/logrotate.d/named 250118 - dnszone.schema bad file permissions 250744 - missed parameter "configtest" in init script usage report 250901 - "service named restart" fails 251528 - RFE: add support for GSSTSIG 252334 - bind-chroot-9.3.3-9.0.1 leaks error noise in its scripts 253537 - avc: denied { getattr } for comm="named" path="/dev/random" 353741 - Rebase to latest 9.3 maintenance release 363531 - New L.ROOT-SERVERS.NET address 419421 - CVE-2007-6283 bind: /etc/rndc.key has 644 permissions by default 423741 - resolver library causes segfaults in bind-utils such as dig,ping 429149 - CVE-2008-0122 libbind off-by-one buffer overflow 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/bind-9.3.4-6.P1.el5.src.rpm i386: bind-9.3.4-6.P1.el5.i386.rpm bind-debuginfo-9.3.4-6.P1.el5.i386.rpm bind-libs-9.3.4-6.P1.el5.i386.rpm bind-sdb-9.3.4-6.P1.el5.i386.rpm bind-utils-9.3.4-6.P1.el5.i386.rpm x86_64: bind-9.3.4-6.P1.el5.x86_64.rpm bind-debuginfo-9.3.4-6.P1.el5.i386.rpm bind-debuginfo-9.3.4-6.P1.el5.x86_64.rpm bind-libs-9.3.4-6.P1.el5.i386.rpm bind-libs-9.3.4-6.P1.el5.x86_64.rpm bind-sdb-9.3.4-6.P1.el5.x86_64.rpm bind-utils-9.3.4-6.P1.el5.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/bind-9.3.4-6.P1.el5.src.rpm i386: bind-chroot-9.3.4-6.P1.el5.i386.rpm bind-debuginfo-9.3.4-6.P1.el5.i386.rpm bind-devel-9.3.4-6.P1.el5.i386.rpm bind-libbind-devel-9.3.4-6.P1.el5.i386.rpm caching-nameserver-9.3.4-6.P1.el5.i386.rpm x86_64: bind-chroot-9.3.4-6.P1.el5.x86_64.rpm bind-debuginfo-9.3.4-6.P1.el5.i386.rpm bind-debuginfo-9.3.4-6.P1.el5.x86_64.rpm bind-devel-9.3.4-6.P1.el5.i386.rpm bind-devel-9.3.4-6.P1.el5.x86_64.rpm bind-libbind-devel-9.3.4-6.P1.el5.i386.rpm bind-libbind-devel-9.3.4-6.P1.el5.x86_64.rpm caching-nameserver-9.3.4-6.P1.el5.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/bind-9.3.4-6.P1.el5.src.rpm i386: bind-9.3.4-6.P1.el5.i386.rpm bind-chroot-9.3.4-6.P1.el5.i386.rpm bind-debuginfo-9.3.4-6.P1.el5.i386.rpm bind-devel-9.3.4-6.P1.el5.i386.rpm bind-libbind-devel-9.3.4-6.P1.el5.i386.rpm bind-libs-9.3.4-6.P1.el5.i386.rpm bind-sdb-9.3.4-6.P1.el5.i386.rpm bind-utils-9.3.4-6.P1.el5.i386.rpm caching-nameserver-9.3.4-6.P1.el5.i386.rpm ia64: bind-9.3.4-6.P1.el5.ia64.rpm bind-chroot-9.3.4-6.P1.el5.ia64.rpm bind-debuginfo-9.3.4-6.P1.el5.i386.rpm bind-debuginfo-9.3.4-6.P1.el5.ia64.rpm bind-devel-9.3.4-6.P1.el5.ia64.rpm bind-libbind-devel-9.3.4-6.P1.el5.ia64.rpm bind-libs-9.3.4-6.P1.el5.i386.rpm bind-libs-9.3.4-6.P1.el5.ia64.rpm bind-sdb-9.3.4-6.P1.el5.ia64.rpm bind-utils-9.3.4-6.P1.el5.ia64.rpm caching-nameserver-9.3.4-6.P1.el5.ia64.rpm ppc: bind-9.3.4-6.P1.el5.ppc.rpm bind-chroot-9.3.4-6.P1.el5.ppc.rpm bind-debuginfo-9.3.4-6.P1.el5.ppc.rpm bind-debuginfo-9.3.4-6.P1.el5.ppc64.rpm bind-devel-9.3.4-6.P1.el5.ppc.rpm bind-devel-9.3.4-6.P1.el5.ppc64.rpm bind-libbind-devel-9.3.4-6.P1.el5.ppc.rpm bind-libbind-devel-9.3.4-6.P1.el5.ppc64.rpm bind-libs-9.3.4-6.P1.el5.ppc.rpm bind-libs-9.3.4-6.P1.el5.ppc64.rpm bind-sdb-9.3.4-6.P1.el5.ppc.rpm bind-utils-9.3.4-6.P1.el5.ppc.rpm caching-nameserver-9.3.4-6.P1.el5.ppc.rpm s390x: bind-9.3.4-6.P1.el5.s390x.rpm bind-chroot-9.3.4-6.P1.el5.s390x.rpm bind-debuginfo-9.3.4-6.P1.el5.s390.rpm bind-debuginfo-9.3.4-6.P1.el5.s390x.rpm bind-devel-9.3.4-6.P1.el5.s390.rpm bind-devel-9.3.4-6.P1.el5.s390x.rpm bind-libbind-devel-9.3.4-6.P1.el5.s390.rpm bind-libbind-devel-9.3.4-6.P1.el5.s390x.rpm bind-libs-9.3.4-6.P1.el5.s390.rpm bind-libs-9.3.4-6.P1.el5.s390x.rpm bind-sdb-9.3.4-6.P1.el5.s390x.rpm bind-utils-9.3.4-6.P1.el5.s390x.rpm caching-nameserver-9.3.4-6.P1.el5.s390x.rpm x86_64: bind-9.3.4-6.P1.el5.x86_64.rpm bind-chroot-9.3.4-6.P1.el5.x86_64.rpm bind-debuginfo-9.3.4-6.P1.el5.i386.rpm bind-debuginfo-9.3.4-6.P1.el5.x86_64.rpm bind-devel-9.3.4-6.P1.el5.i386.rpm bind-devel-9.3.4-6.P1.el5.x86_64.rpm bind-libbind-devel-9.3.4-6.P1.el5.i386.rpm bind-libbind-devel-9.3.4-6.P1.el5.x86_64.rpm bind-libs-9.3.4-6.P1.el5.i386.rpm bind-libs-9.3.4-6.P1.el5.x86_64.rpm bind-sdb-9.3.4-6.P1.el5.x86_64.rpm bind-utils-9.3.4-6.P1.el5.x86_64.rpm caching-nameserver-9.3.4-6.P1.el5.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6283 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0122 http://www.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/ Copyright 2008 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFINDHvXlSAg2UNWIIRAia8AJ9cwIMZ6KExQLVgCPAIMULjcefR1ACgnlYa 0//nmfeApeTQaT/uZaR3LRQ= =nRjq - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBSDUMUih9+71yA2DNAQJ7jAP8Cpe5NdOCVcZfk3iEP4e0+jvm5cbt5p15 QQWgxuLrWzZ446Jntmiwpkw7hYYr9PZTjNsu4MRSUXLveHyhhWVTzBgcN6yOaaZq xGbfcxO0N/7T9AKIcsHR3jyxNtjGKkdzRcOk4EztkwPu/aiQh2LZt3+lQR3CDFtT 1DwDjG8Gz/s= =tOY6 -----END PGP SIGNATURE-----