Login
Newsletter
Werbung

Sicherheit: Lesen von ungültigen DNS-Daten in perl-Net-DNS
Aktuelle Meldungen Distributionen
Name: Lesen von ungültigen DNS-Daten in perl-Net-DNS
ID: RHSA-2007:0675-01
Distribution: Red Hat
Plattformen: Red Hat Enterprise Linux
Datum: Do, 12. Juli 2007, 12:50
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3377
Applikationen: perl-Net-DNS

Originalnachricht

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Moderate: perl-Net-DNS security update
Advisory ID: RHSA-2007:0675-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2007-0675.html
Issue date: 2007-07-12
Updated on: 2007-07-12
Product: Red Hat Enterprise Linux
CVE Names: CVE-2007-3377
- ---------------------------------------------------------------------

1. Summary:

An updated perl-Net-DNS package that corrects a security issue is now
available for Red Hat Enterprise Linux 4.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64

3. Problem description:

Net::DNS is a collection of Perl modules that act as a Domain Name System
(DNS) resolver.

A flaw was found in the way Net::DNS generated the ID field in a DNS query.
This predictable ID field could be used by a remote attacker to return
invalid DNS data. (CVE-2007-3377)

Users of Net::DNS should upgrade to this updated package, which contains
backported patches to correct this issue.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

5. Bug IDs fixed (http://bugzilla.redhat.com/):

245466 - CVE-2007-3377 perl-net-DNS security issue

6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:
perl-Net-DNS-0.48-2.el4.src.rpm
1434303a9458e1f4461e50d8c3b3dbc4 perl-Net-DNS-0.48-2.el4.src.rpm

i386:
28476d3ac5f2deb04d5ac740dbd287f4 perl-Net-DNS-0.48-2.el4.i386.rpm
96274498293760852c9d65f71b50767b perl-Net-DNS-debuginfo-0.48-2.el4.i386.rpm

ia64:
275e5bd9423c994ba3fa42beeec5d1cd perl-Net-DNS-0.48-2.el4.ia64.rpm
817c91e7b08262bee73052a047214e6d perl-Net-DNS-debuginfo-0.48-2.el4.ia64.rpm

ppc:
3efd00fc8e673cf8b5d65890e8346eed perl-Net-DNS-0.48-2.el4.ppc.rpm
fc57794d5784e5def0d19675f388717b perl-Net-DNS-debuginfo-0.48-2.el4.ppc.rpm

s390:
b1a1ae4d7f112ef94654369ac44d45ec perl-Net-DNS-0.48-2.el4.s390.rpm
a954b8ad460167ffb7c4f98bb78266b5 perl-Net-DNS-debuginfo-0.48-2.el4.s390.rpm

s390x:
9adcb38363dd990bcc67cce9a8be25a7 perl-Net-DNS-0.48-2.el4.s390x.rpm
294c04447658014f6e62a98df4ca4b94 perl-Net-DNS-debuginfo-0.48-2.el4.s390x.rpm

x86_64:
3e8637d884a3b84ea38e697a9ec915c2 perl-Net-DNS-0.48-2.el4.x86_64.rpm
851d0fe7b04b9155384557f57f9245ba perl-Net-DNS-debuginfo-0.48-2.el4.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
perl-Net-DNS-0.48-2.el4.src.rpm
1434303a9458e1f4461e50d8c3b3dbc4 perl-Net-DNS-0.48-2.el4.src.rpm

i386:
28476d3ac5f2deb04d5ac740dbd287f4 perl-Net-DNS-0.48-2.el4.i386.rpm
96274498293760852c9d65f71b50767b perl-Net-DNS-debuginfo-0.48-2.el4.i386.rpm

x86_64:
3e8637d884a3b84ea38e697a9ec915c2 perl-Net-DNS-0.48-2.el4.x86_64.rpm
851d0fe7b04b9155384557f57f9245ba perl-Net-DNS-debuginfo-0.48-2.el4.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
perl-Net-DNS-0.48-2.el4.src.rpm
1434303a9458e1f4461e50d8c3b3dbc4 perl-Net-DNS-0.48-2.el4.src.rpm

i386:
28476d3ac5f2deb04d5ac740dbd287f4 perl-Net-DNS-0.48-2.el4.i386.rpm
96274498293760852c9d65f71b50767b perl-Net-DNS-debuginfo-0.48-2.el4.i386.rpm

ia64:
275e5bd9423c994ba3fa42beeec5d1cd perl-Net-DNS-0.48-2.el4.ia64.rpm
817c91e7b08262bee73052a047214e6d perl-Net-DNS-debuginfo-0.48-2.el4.ia64.rpm

x86_64:
3e8637d884a3b84ea38e697a9ec915c2 perl-Net-DNS-0.48-2.el4.x86_64.rpm
851d0fe7b04b9155384557f57f9245ba perl-Net-DNS-debuginfo-0.48-2.el4.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
perl-Net-DNS-0.48-2.el4.src.rpm
1434303a9458e1f4461e50d8c3b3dbc4 perl-Net-DNS-0.48-2.el4.src.rpm

i386:
28476d3ac5f2deb04d5ac740dbd287f4 perl-Net-DNS-0.48-2.el4.i386.rpm
96274498293760852c9d65f71b50767b perl-Net-DNS-debuginfo-0.48-2.el4.i386.rpm

ia64:
275e5bd9423c994ba3fa42beeec5d1cd perl-Net-DNS-0.48-2.el4.ia64.rpm
817c91e7b08262bee73052a047214e6d perl-Net-DNS-debuginfo-0.48-2.el4.ia64.rpm

x86_64:
3e8637d884a3b84ea38e697a9ec915c2 perl-Net-DNS-0.48-2.el4.x86_64.rpm
851d0fe7b04b9155384557f57f9245ba perl-Net-DNS-debuginfo-0.48-2.el4.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3377
http://www.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2007 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFGlgLJXlSAg2UNWIIRAmvwAJ9YqCwWOlx+Thq6docoY3AhAS8bHQCZASNi
OQo3DEJQcd7lg/ZBHdhIStA=
=8kRZ
-----END PGP SIGNATURE-----



--
Enterprise-watch-list mailing list
Enterprise-watch-list@redhat.com
https://www.redhat.com/mailman/listinfo/enterprise-watch-list
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung