drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Lesen von ungültigen DNS-Daten in perl-Net-DNS
Name: |
Lesen von ungültigen DNS-Daten in perl-Net-DNS |
|
ID: |
RHSA-2007:0675-01 |
|
Distribution: |
Red Hat |
|
Plattformen: |
Red Hat Enterprise Linux |
|
Datum: |
Do, 12. Juli 2007, 12:50 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3377 |
|
Applikationen: |
perl-Net-DNS |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
- --------------------------------------------------------------------- Red Hat Security Advisory
Synopsis: Moderate: perl-Net-DNS security update Advisory ID: RHSA-2007:0675-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2007-0675.html Issue date: 2007-07-12 Updated on: 2007-07-12 Product: Red Hat Enterprise Linux CVE Names: CVE-2007-3377 - ---------------------------------------------------------------------
1. Summary:
An updated perl-Net-DNS package that corrects a security issue is now available for Red Hat Enterprise Linux 4.
This update has been rated as having moderate security impact by the Red Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64
3. Problem description:
Net::DNS is a collection of Perl modules that act as a Domain Name System (DNS) resolver.
A flaw was found in the way Net::DNS generated the ID field in a DNS query. This predictable ID field could be used by a remote attacker to return invalid DNS data. (CVE-2007-3377)
Users of Net::DNS should upgrade to this updated package, which contains backported patches to correct this issue.
4. Solution:
Before applying this update, make sure that all previously-released errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188
5. Bug IDs fixed (http://bugzilla.redhat.com/):
245466 - CVE-2007-3377 perl-net-DNS security issue
6. RPMs required:
Red Hat Enterprise Linux AS version 4:
SRPMS: perl-Net-DNS-0.48-2.el4.src.rpm 1434303a9458e1f4461e50d8c3b3dbc4 perl-Net-DNS-0.48-2.el4.src.rpm
i386: 28476d3ac5f2deb04d5ac740dbd287f4 perl-Net-DNS-0.48-2.el4.i386.rpm 96274498293760852c9d65f71b50767b perl-Net-DNS-debuginfo-0.48-2.el4.i386.rpm
ia64: 275e5bd9423c994ba3fa42beeec5d1cd perl-Net-DNS-0.48-2.el4.ia64.rpm 817c91e7b08262bee73052a047214e6d perl-Net-DNS-debuginfo-0.48-2.el4.ia64.rpm
ppc: 3efd00fc8e673cf8b5d65890e8346eed perl-Net-DNS-0.48-2.el4.ppc.rpm fc57794d5784e5def0d19675f388717b perl-Net-DNS-debuginfo-0.48-2.el4.ppc.rpm
s390: b1a1ae4d7f112ef94654369ac44d45ec perl-Net-DNS-0.48-2.el4.s390.rpm a954b8ad460167ffb7c4f98bb78266b5 perl-Net-DNS-debuginfo-0.48-2.el4.s390.rpm
s390x: 9adcb38363dd990bcc67cce9a8be25a7 perl-Net-DNS-0.48-2.el4.s390x.rpm 294c04447658014f6e62a98df4ca4b94 perl-Net-DNS-debuginfo-0.48-2.el4.s390x.rpm
x86_64: 3e8637d884a3b84ea38e697a9ec915c2 perl-Net-DNS-0.48-2.el4.x86_64.rpm 851d0fe7b04b9155384557f57f9245ba perl-Net-DNS-debuginfo-0.48-2.el4.x86_64.rpm
Red Hat Enterprise Linux Desktop version 4:
SRPMS: perl-Net-DNS-0.48-2.el4.src.rpm 1434303a9458e1f4461e50d8c3b3dbc4 perl-Net-DNS-0.48-2.el4.src.rpm
i386: 28476d3ac5f2deb04d5ac740dbd287f4 perl-Net-DNS-0.48-2.el4.i386.rpm 96274498293760852c9d65f71b50767b perl-Net-DNS-debuginfo-0.48-2.el4.i386.rpm
x86_64: 3e8637d884a3b84ea38e697a9ec915c2 perl-Net-DNS-0.48-2.el4.x86_64.rpm 851d0fe7b04b9155384557f57f9245ba perl-Net-DNS-debuginfo-0.48-2.el4.x86_64.rpm
Red Hat Enterprise Linux ES version 4:
SRPMS: perl-Net-DNS-0.48-2.el4.src.rpm 1434303a9458e1f4461e50d8c3b3dbc4 perl-Net-DNS-0.48-2.el4.src.rpm
i386: 28476d3ac5f2deb04d5ac740dbd287f4 perl-Net-DNS-0.48-2.el4.i386.rpm 96274498293760852c9d65f71b50767b perl-Net-DNS-debuginfo-0.48-2.el4.i386.rpm
ia64: 275e5bd9423c994ba3fa42beeec5d1cd perl-Net-DNS-0.48-2.el4.ia64.rpm 817c91e7b08262bee73052a047214e6d perl-Net-DNS-debuginfo-0.48-2.el4.ia64.rpm
x86_64: 3e8637d884a3b84ea38e697a9ec915c2 perl-Net-DNS-0.48-2.el4.x86_64.rpm 851d0fe7b04b9155384557f57f9245ba perl-Net-DNS-debuginfo-0.48-2.el4.x86_64.rpm
Red Hat Enterprise Linux WS version 4:
SRPMS: perl-Net-DNS-0.48-2.el4.src.rpm 1434303a9458e1f4461e50d8c3b3dbc4 perl-Net-DNS-0.48-2.el4.src.rpm
i386: 28476d3ac5f2deb04d5ac740dbd287f4 perl-Net-DNS-0.48-2.el4.i386.rpm 96274498293760852c9d65f71b50767b perl-Net-DNS-debuginfo-0.48-2.el4.i386.rpm
ia64: 275e5bd9423c994ba3fa42beeec5d1cd perl-Net-DNS-0.48-2.el4.ia64.rpm 817c91e7b08262bee73052a047214e6d perl-Net-DNS-debuginfo-0.48-2.el4.ia64.rpm
x86_64: 3e8637d884a3b84ea38e697a9ec915c2 perl-Net-DNS-0.48-2.el4.x86_64.rpm 851d0fe7b04b9155384557f57f9245ba perl-Net-DNS-debuginfo-0.48-2.el4.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package
7. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3377 http://www.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/
Copyright 2007 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFGlgLJXlSAg2UNWIIRAmvwAJ9YqCwWOlx+Thq6docoY3AhAS8bHQCZASNi OQo3DEJQcd7lg/ZBHdhIStA= =8kRZ -----END PGP SIGNATURE-----
-- Enterprise-watch-list mailing list Enterprise-watch-list@redhat.com https://www.redhat.com/mailman/listinfo/enterprise-watch-list
|
|
|
|