« 気づいた時には大事になったりします。 | メイン | CentOS5でBind9をUpdateしたらファイルが壊される・・・ »
2007年7月26日
BindのSecurity Update >>DNS
BindのSecurity Hole対策で、各ディストリビューションからもUpdateが出ています。
CentOS(RedHat Clone)
https://rhn.redhat.com/errata/RHSA-2007-0740.html
Updated bind packages that fix a security issue are now available.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
ISC BIND (Berkeley Internet Name Domain) is an implementation of the DNS
(Domain Name System) protocols.
A flaw was found in the way BIND generates outbound DNS query ids. If an
attacker is able to acquire a finite set of query IDs, it becomes possible
to accurately predict future query IDs. Future query ID prediction may
allow an attacker to conduct a DNS cache poisoning attack, which can result
in the DNS server returning incorrect client query data. (CVE-2007-2926)
Users of BIND are advised to upgrade to these updated packages, which
contain backported patches to correct this issue.
Debian の方
Package : bind9
Vulnerability : design error
Problem-Type : remote
Debian-specific: no
CVE ID : CVE-2007-2926
Amit Klein discovered that the BIND name server generates predictable
DNS query IDs, which may lead to cache poisoning attacks.
An update for the oldstable distribution (sarge) is in preparation. It
will be released soon.
For the stable distribution (etch) this problem has been fixed in
version 9.3.4-2etch1. An update for mips is not yet available, it will
be released soon.
For the unstable distribution (sid) this problem will be fixed soon.
We recommend that you upgrade your BIND packages.
とりあえず、さくっと上げられるところは上げ終わった。
トラックバック
現在、この記事はトラックバックを受け付けておりません。
コメント
現在、この記事はコメントを受け付けておりません。