blob: 5b95c693454c86e509b893a2a8eee3b1c5fc10a1 [file] [log] [blame]
<?xml version="1.0" encoding="UTF-8"?>
<glsa id="201201-05">
<title>mDNSResponder: Multiple vulnerabilities</title>
<synopsis>Multiple vulnerabilities have been found in mDNSResponder, which
could lead to execution of arbitrary code with root privileges.
<product type="ebuild">mDNSResponder</product>
<announced>January 22, 2012</announced>
<revised>January 22, 2012: 1</revised>
<access>local, remote</access>
<package name="net-misc/mDNSResponder" auto="yes" arch="*">
<unaffected range="ge">212.1</unaffected>
<vulnerable range="lt">212.1</vulnerable>
<p>mDNSResponder is a component of Apple's Bonjour, an initiative for
zero-configuration networking.
<p>Multiple vulnerabilities have been discovered in mDNSResponder. Please
review the CVE identifiers referenced below for details.
<impact type="high">
<p>A local or remote attacker may be able to execute arbitrary code with
root privileges or cause a Denial of Service.
<p>There is no known workaround at this time.</p>
<p>All mDNSResponder users should upgrade to the latest version:</p>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=net-misc/mDNSResponder-212.1"
<p>NOTE: This is a legacy GLSA. Updates for all affected architectures are
available since November 21, 2009. It is likely that your system is
already no longer affected by this issue.
<uri link="">CVE-2007-2386</uri>
<uri link="">CVE-2007-3744</uri>
<uri link="">CVE-2007-3828</uri>
<uri link="">CVE-2008-0989</uri>
<uri link="">CVE-2008-2326</uri>
<uri link="">CVE-2008-3630</uri>
<metadata timestamp="Fri, 07 Oct 2011 23:37:04 +0000" tag="requester">
<metadata timestamp="Sun, 22 Jan 2012 13:43:13 +0000" tag="submitter">ackle</metadata>