Date: 23 December 2011
References: ASB-2011.0121
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2011.1280
unbound security update
23 December 2011
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: unbound
Publisher: Debian
Operating System: Debian GNU/Linux
Impact/Access: Denial of Service -- Remote/Unauthenticated
Resolution: Patch/Upgrade
CVE Names: CVE-2011-4869 CVE-2011-4528
Reference: ASB-2011.0121
Original Bulletin:
http://www.debian.org/security/2011/dsa-2370
- --------------------------BEGIN INCLUDED TEXT--------------------
- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- - -------------------------------------------------------------------------
Debian Security Advisory DSA-2370-1 security@debian.org
http://www.debian.org/security/ Florian Weimer
December 22, 2011 http://www.debian.org/security/faq
- - -------------------------------------------------------------------------
Package : unbound
Vulnerability : several
Problem type : remote
Debian-specific: no
CVE ID : CVE-2011-4528 CVE-2011-4869
It was discovered that Unbound, a recursive DNS resolver, would crash
when processing certain malformed DNS responses from authoritative DNS
servers, leading to denial of service.
CVE-2011-4528
Unbound attempts to free unallocated memory during processing
of duplicate CNAME records in a signed zone.
CVE-2011-4869
Unbound does not properly process malformed responses which
lack expected NSEC3 records.
For the oldstable distribution (lenny), these problems have been fixed in
version 1.4.6-1~lenny2.
For the stable distribution (squeeze), these problems have been fixed in
version 1.4.6-1+squeeze2.
For the testing distribution (wheezy) and the unstable distribution
(sid), these problems have been fixed in version 1.4.14-1.
We recommend that you upgrade your unbound packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iQEcBAEBAgAGBQJO84AiAAoJEL97/wQC1SS+o7MIALCSkqwBIcOdsT10ltH6nHvB
+Of40Vs6QNCDhplmX8+Y6e5Ha6UG5hZLdV/PALok3OkMj0Oyd2cIs6EXXT+QICg9
BgFgDwFtpFSZw5/X9WN3AensVmp2RXmIowM9CQ1MigHCrc08BIRVqiYKK9ZoQZ6m
4zE2ZDbug92pIK4ax1qUBzPoxESlw8E1zgcntZxS7AgaaLvKrEFXPlymsu+Eavv/
E3qyyXAEtE+DQ1Sl9X2w0o59CR9SKgWbTahsY2kS5tO631e3N3/RmApYGxssWl4h
IGKJaONRjyOh13HVK1FZ7Um2y0KCXNlEtiKbTrCstx0Aa9Ka04LRfHSUPdEpeIs=
=cEIS
- -----END PGP SIGNATURE-----
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
http://www.auscert.org.au/render.html?cid=1980
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967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=UhjC
-----END PGP SIGNATURE-----
|