blob: e553c88538128218a83abd046f90d1256581387e [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200702-06">
<title>BIND: Denial of Service</title>
ISC BIND contains two vulnerabilities allowing a Denial of Service under
certain conditions.
<product type="ebuild">bind</product>
<announced>February 17, 2007</announced>
<revised>February 17, 2007: 01</revised>
<package name="net-dns/bind" auto="yes" arch="*">
<unaffected range="ge">9.3.4</unaffected>
<unaffected range="rge">9.2.8</unaffected>
<vulnerable range="lt">9.3.4</vulnerable>
ISC BIND is the Internet Systems Consortium implementation of the
Domain Name System (DNS) protocol.
An unspecified improper usage of an already freed context has been
reported. Additionally, an assertion error could be triggered in the
DNSSEC validation of some responses to type ANY queries with multiple
<impact type="normal">
A remote attacker could crash the server through unspecified vectors
or, if DNSSEC validation is enabled, by sending certain crafted ANY
There is no known workaround at this time for the first issue. The
DNSSEC validation Denial of Service can be prevented by disabling
DNSSEC validation until the upgrade to a fixed version. Note that
DNSSEC validation is disabled on a default configuration.
All ISC BIND 9.3 users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=net-dns/bind-9.3.4&quot;</code>
All ISC BIND 9.2 users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=net-dns/bind-9.2.8&quot;</code>
<uri link="">CVE-2007-0493</uri>
<uri link="">CVE-2007-0494</uri>
<metadata tag="requester" timestamp="Fri, 16 Feb 2007 09:07:21 +0000">
<metadata tag="submitter" timestamp="Fri, 16 Feb 2007 17:39:52 +0000">
<metadata tag="bugReady" timestamp="Sat, 17 Feb 2007 15:53:00 +0000">