« 気づいた時には大事になったりします。 | メイン | CentOS5でBind9をUpdateしたらファイルが壊される・・・ »


BindのSecurity Update >>DNS 

BindのSecurity Hole対策で、各ディストリビューションからもUpdateが出ています。

CentOS(RedHat Clone)

Updated bind packages that fix a security issue are now available.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

ISC BIND (Berkeley Internet Name Domain) is an implementation of the DNS
(Domain Name System) protocols.

A flaw was found in the way BIND generates outbound DNS query ids. If an
attacker is able to acquire a finite set of query IDs, it becomes possible
to accurately predict future query IDs. Future query ID prediction may
allow an attacker to conduct a DNS cache poisoning attack, which can result
in the DNS server returning incorrect client query data. (CVE-2007-2926)

Users of BIND are advised to upgrade to these updated packages, which
contain backported patches to correct this issue.

Debian の方

Package : bind9
Vulnerability : design error
Problem-Type : remote
Debian-specific: no
CVE ID : CVE-2007-2926

Amit Klein discovered that the BIND name server generates predictable
DNS query IDs, which may lead to cache poisoning attacks.

An update for the oldstable distribution (sarge) is in preparation. It
will be released soon.

For the stable distribution (etch) this problem has been fixed in
version 9.3.4-2etch1. An update for mips is not yet available, it will
be released soon.

For the unstable distribution (sid) this problem will be fixed soon.

We recommend that you upgrade your BIND packages.



投稿者 debizoh : 2007年7月26日 06:44