drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in BIND
Name: |
Mehrere Probleme in BIND |
|
ID: |
USN-3172-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 12.04 LTS, Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 16.10 |
|
Datum: |
Do, 12. Januar 2017, 15:19 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9131
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9147
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9444 |
|
Applikationen: |
BIND |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============4189646105383094171== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="F7how4anxoW9qjk4HLVv4gHCl6Fm8Irut"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --F7how4anxoW9qjk4HLVv4gHCl6Fm8Irut Content-Type: multipart/mixed; boundary="RBQLtM6BIhxamMELE0SRQnFB8wRtGP1XP" From: Marc Deslauriers <marc.deslauriers@canonical.com> Reply-To: Ubuntu Security <security@ubuntu.com> To: ubuntu-security-announce@lists.ubuntu.com Message-ID: <18757642-bb6c-c1fb-da9e-d93b1849d2cd@canonical.com> Subject: [USN-3172-1] Bind vulnerabilities
--RBQLtM6BIhxamMELE0SRQnFB8wRtGP1XP Content-Type: text/plain; charset=utf- Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-3172-1 January 12, 2017
bind9 vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.10 - Ubuntu 16.04 LTS - Ubuntu 14.04 LTS - Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in Bind.
Software Description: - bind9: Internet Domain Name Server
Details:
It was discovered that Bind incorrectly handled certain malformed responses to an ANY query. A remote attacker could possibly use this issue to cause Bind to crash, resulting in a denial of service. (CVE-2016-9131)
It was discovered that Bind incorrectly handled certain malformed responses to an ANY query. A remote attacker could possibly use this issue to cause Bind to crash, resulting in a denial of service. (CVE-2016-9147)
It was discovered that Bind incorrectly handled certain malformed DS record responses. A remote attacker could possibly use this issue to cause Bind to crash, resulting in a denial of service. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS and Ubuntu 16.10. (CVE-2016-9444)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.10: bind9 1:9.10.3.dfsg.P4-10.1ubuntu1.2
Ubuntu 16.04 LTS: bind9 1:9.10.3.dfsg.P4-8ubuntu1.4
Ubuntu 14.04 LTS: bind9 1:9.9.5.dfsg-3ubuntu0.11
Ubuntu 12.04 LTS: bind9 1:9.8.1.dfsg.P1-4ubuntu0.20
In general, a standard system update will make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-3172-1 CVE-2016-9131, CVE-2016-9147, CVE-2016-9444
Package Information: https://launchpad.net/ubuntu/+source/bind9/1:9.10.3.dfsg.P4-10.1ubuntu1.2 https://launchpad.net/ubuntu/+source/bind9/1:9.10.3.dfsg.P4-8ubuntu1.4 https://launchpad.net/ubuntu/+source/bind9/1:9.9.5.dfsg-3ubuntu0.11 https://launchpad.net/ubuntu/+source/bind9/1:9.8.1.dfsg.P1-4ubuntu0.20
--RBQLtM6BIhxamMELE0SRQnFB8wRtGP1XP--
--F7how4anxoW9qjk4HLVv4gHCl6Fm8Irut Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v2
iQIcBAEBCgAGBQJYd3vOAAoJEGVp2FWnRL6TNuEP+QFz+HSgorLJOOKAtEO21PWx gzR/BcCWZsKD3pNsdfVlA+rpY8R1gk+bqKrpxt1BGUrs3GKaLq+5x1Jjslf0Dg0o RhVsfD6gUMoGXzr5MEJVt7T3c/t++rULvZx6ivAAPhmpalrBggsOE6uETqE2A7x6 EZhqQaBp1Zr2YznO9t1nBcxfVk/z9zjquPjlHYPSt830jwKyoZ1f/90YL1luqfLl HWaqu6vuJ9xAeIxjTnr7Cg6RQaMIbbeOzSOCOOUc55E3N8/cdrSYHdBJaz0a5E4e 53rEVO+KMct6GU4W3ghXruYjsvAlIaUB425JcpVDWqOgsEstKXyK3XrvE/zfYpws yBHm7kjOBFB+pqezvrsgeW3GVlPEkARh3uTgkBcytllTFY7m302/8tcnHl9iMYm0 TusH4XjxRMGqKEVaJkfW7asklX/QYoMdhU3RjKqmzvLa1v44PZlNZPOn/9G8KGjq +RL+yJgLKwLJOYnk9k4zMpHUCPwfo2koHgOL0Ud23oCUU5fuGtZV7ETSjZYCYsRi 6Bszmw7q/dtxBhMyYMyScOh1Yy+CbM1CIewH/hZhCoSVpSc2oQi9JOP0olnkMfoX du1TtgzSciQacOuu/hGdMIIv3YDQtZvl1jKM1RPe/ktvbR4mBMpt2bl0+F/au5lX oTKJxvB5UEhWUDACJt8U =vsj3 -----END PGP SIGNATURE-----
--F7how4anxoW9qjk4HLVv4gHCl6Fm8Irut--
--===============4189646105383094171== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============4189646105383094171==--
|
|
|
|