Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2009.0448 -- [UNIX/Linux][Debian] ldns: Execute Arbitrary Code 8 May 2009 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: ldns Publisher: Debian Operating System: Debian GNU/Linux 4.0 Debian GNU/Linux 5.0 UNIX variants (UNIX, Linux, OSX) Impact: Execute Arbitrary Code/Commands Access: Remote/Unauthenticated CVE Names: CVE-2009-1086 Original Bulletin: http://www.debian.org/security/2009/dsa-1795 Comment: This advisory references vulnerabilities in products which run on platforms other than Debian. It is recommended that administrators running ldns check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - ------------------------------------------------------------------------ Debian Security Advisory DSA-1795 security@debian.org http://www.debian.org/security/ Devin Carraway May 07, 2009 http://www.debian.org/security/faq - - ------------------------------------------------------------------------ Package : ldns Vulnerability : buffer overflow Problem type : local (remote) Debian-specific: no CVE Id(s) : CVE-2009-1086 Stefan Kaltenbrunner discovered that ldns, a library and set of utilities to facilitate DNS programming, did not correctly implement a buffer boundary check in its RR DNS record parser. This weakness could enable overflow of a heap buffer if a maliciously-crafted record is parsed, potentially allowing the execution of arbitrary code. The scope of compromise will vary with the context in which ldns is used, and could present either a local or remote attack vector. The old stable distribution (etch) is not affected by this issue. For the stable distribution (lenny), this problem has been fixed in version 1.4.0-1+lenny1. For the unstable distribution (sid), this problem was fixed in version 1.5.1-1. We recommend that you upgrade your ldns packages. Upgrade instructions - - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 4.0 alias etch - - ------------------------------- Debian GNU/Linux 5.0 alias lenny - - -------------------------------- Debian (stable) - - --------------- Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. Source archives: http://security.debian.org/pool/updates/main/l/ldns/ldns_1.4.0.orig.tar.gz Size/MD5 checksum: 807484 3af0b721222afa8bbfbe6db22b4be613 http://security.debian.org/pool/updates/main/l/ldns/ldns_1.4.0-1+lenny1.diff.gz Size/MD5 checksum: 42602 ec277451483fc47ca762a41871bdd221 http://security.debian.org/pool/updates/main/l/ldns/ldns_1.4.0-1+lenny1.dsc Size/MD5 checksum: 1034 988f2ea0ec08e7ec89ac4990556e4b1a alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/l/ldns/ldnsutils_1.4.0-1+lenny1_alpha.deb Size/MD5 checksum: 154268 669a25a26228798017e484eac3aa4165 http://security.debian.org/pool/updates/main/l/ldns/libldns-dev_1.4.0-1+lenny1_alpha.deb Size/MD5 checksum: 352842 60a9e03f7d4369d6f588669c9e3f15b3 http://security.debian.org/pool/updates/main/l/ldns/libldns1_1.4.0-1+lenny1_alpha.deb Size/MD5 checksum: 133694 a5d8ae4f5c91f94c5ae8fecf03340d5e amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/l/ldns/libldns-dev_1.4.0-1+lenny1_amd64.deb Size/MD5 checksum: 298050 a759b7e90b25fa009718ae97e7394bad http://security.debian.org/pool/updates/main/l/ldns/libldns1_1.4.0-1+lenny1_amd64.deb Size/MD5 checksum: 123816 861a02e0ba8da5dd26dcfbf795ba66bb http://security.debian.org/pool/updates/main/l/ldns/ldnsutils_1.4.0-1+lenny1_amd64.deb Size/MD5 checksum: 147108 de8d28ab89af6f2cb5c8874515551cd2 arm architecture (ARM) http://security.debian.org/pool/updates/main/l/ldns/libldns-dev_1.4.0-1+lenny1_arm.deb Size/MD5 checksum: 274872 abb3892710d70634f9234e242fa36dee http://security.debian.org/pool/updates/main/l/ldns/ldnsutils_1.4.0-1+lenny1_arm.deb Size/MD5 checksum: 132434 dbf80b7c12aff2892433305277e8ea57 http://security.debian.org/pool/updates/main/l/ldns/libldns1_1.4.0-1+lenny1_arm.deb Size/MD5 checksum: 97660 c226ba159ac214ab55a05ca6222d811b armel architecture (ARM EABI) http://security.debian.org/pool/updates/main/l/ldns/libldns1_1.4.0-1+lenny1_armel.deb Size/MD5 checksum: 98754 6419159ea05543740804ae7d00834ec9 http://security.debian.org/pool/updates/main/l/ldns/libldns-dev_1.4.0-1+lenny1_armel.deb Size/MD5 checksum: 273732 08ed6d16d8c4b355122d25458ef4d8d9 http://security.debian.org/pool/updates/main/l/ldns/ldnsutils_1.4.0-1+lenny1_armel.deb Size/MD5 checksum: 134780 fecc4ca944671beb5f383468e3d8e4c6 hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/l/ldns/libldns1_1.4.0-1+lenny1_hppa.deb Size/MD5 checksum: 119202 7dcb3019e21115dd9288e6718b676f8e http://security.debian.org/pool/updates/main/l/ldns/libldns-dev_1.4.0-1+lenny1_hppa.deb Size/MD5 checksum: 304434 1bf6066619bc3b95f09d3d9b868caf52 http://security.debian.org/pool/updates/main/l/ldns/ldnsutils_1.4.0-1+lenny1_hppa.deb Size/MD5 checksum: 143602 1640c8ff9642882c8364d69a2bb63a10 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/l/ldns/libldns1_1.4.0-1+lenny1_i386.deb Size/MD5 checksum: 113166 0f2dbd1dcd9f92c280a80a5d1a7c0f1a http://security.debian.org/pool/updates/main/l/ldns/ldnsutils_1.4.0-1+lenny1_i386.deb Size/MD5 checksum: 136032 d04cfb74c763514f32fbb531c872ede1 http://security.debian.org/pool/updates/main/l/ldns/libldns-dev_1.4.0-1+lenny1_i386.deb Size/MD5 checksum: 277938 66bb9673496c17fe9d37a2fd490b9dbc ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/l/ldns/libldns-dev_1.4.0-1+lenny1_ia64.deb Size/MD5 checksum: 346400 ba3051e06f50d61c43bdc5f31cfeed22 http://security.debian.org/pool/updates/main/l/ldns/libldns1_1.4.0-1+lenny1_ia64.deb Size/MD5 checksum: 155732 3d553d3f0dc981dd46a6e2805da734a7 http://security.debian.org/pool/updates/main/l/ldns/ldnsutils_1.4.0-1+lenny1_ia64.deb Size/MD5 checksum: 185404 d575976ac67b3039cfbfa8d1f9092bce mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/l/ldns/ldnsutils_1.4.0-1+lenny1_mips.deb Size/MD5 checksum: 133828 dda7369db1a6ffdf50acc967cfb16d28 http://security.debian.org/pool/updates/main/l/ldns/libldns-dev_1.4.0-1+lenny1_mips.deb Size/MD5 checksum: 300906 2873ee98d88d660b8c0682c136ae1d9a http://security.debian.org/pool/updates/main/l/ldns/libldns1_1.4.0-1+lenny1_mips.deb Size/MD5 checksum: 102082 a5046cccee67968a498d77057554ff1a mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/l/ldns/libldns-dev_1.4.0-1+lenny1_mipsel.deb Size/MD5 checksum: 300220 262c6660c652b447fb36c62f28004571 http://security.debian.org/pool/updates/main/l/ldns/ldnsutils_1.4.0-1+lenny1_mipsel.deb Size/MD5 checksum: 133832 47b9bd225a2590f74101799cc56553e5 http://security.debian.org/pool/updates/main/l/ldns/libldns1_1.4.0-1+lenny1_mipsel.deb Size/MD5 checksum: 101384 9155b1a75f3a6ba8379cb3cd90a8e3f0 powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/l/ldns/libldns1_1.4.0-1+lenny1_powerpc.deb Size/MD5 checksum: 121704 1db8fba9a463d2c13b778e3ce4506166 http://security.debian.org/pool/updates/main/l/ldns/ldnsutils_1.4.0-1+lenny1_powerpc.deb Size/MD5 checksum: 183408 3fb158b2c0a4cebabf29bb14c40a6f63 http://security.debian.org/pool/updates/main/l/ldns/libldns-dev_1.4.0-1+lenny1_powerpc.deb Size/MD5 checksum: 292974 83cdffb0fa56120b18674850e37a3adf s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/l/ldns/libldns-dev_1.4.0-1+lenny1_s390.deb Size/MD5 checksum: 296340 514869e5dbef20738cf1c10ac2bfe365 http://security.debian.org/pool/updates/main/l/ldns/ldnsutils_1.4.0-1+lenny1_s390.deb Size/MD5 checksum: 150064 5a2a6856085d05065e6c83fc85acceea http://security.debian.org/pool/updates/main/l/ldns/libldns1_1.4.0-1+lenny1_s390.deb Size/MD5 checksum: 130754 013a58c936f76cd0014c68d211ec702a sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/l/ldns/libldns1_1.4.0-1+lenny1_sparc.deb Size/MD5 checksum: 105488 7b61f31b2ff4f083827f87268d86cd27 http://security.debian.org/pool/updates/main/l/ldns/libldns-dev_1.4.0-1+lenny1_sparc.deb Size/MD5 checksum: 279702 ceb4483705cf3b91f0ec266f5eae4f1b http://security.debian.org/pool/updates/main/l/ldns/ldnsutils_1.4.0-1+lenny1_sparc.deb Size/MD5 checksum: 137774 29820cb49b777eff7f8348d39402ceec These files will probably be moved into the stable distribution on its next update. - - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFKAntcU5XKDemr/NIRArXKAJ4h5HdI3hEVSZ1gbemW6X6FJBUL1wCfdCFI +qnS/zHib45B7oiHQpn4LvQ= =qu9g - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iD8DBQFKA6xGNVH5XJJInbgRAqDRAJ9RDnhfeqXS1bae1Ns7YkeEhmtBuQCdF53U gI12LZluoX7z4afUEUMdwIg= =uMOq -----END PGP SIGNATURE-----