[Intrepid] Security issue could allow dns-poisoning

Bug #399012 reported by Andreas Moog
258
This bug affects 1 person
Affects Status Importance Assigned to Milestone
djbdns (Ubuntu)
Fix Released
Medium
Unassigned

Bug Description

Binary package hint: djbdns

Matthew Dempsky discovered that Daniel J. Bernstein's djbdns, a Domain
Name System server, does not constrain offsets in the required manner,
which allows remote attackers with control over a third-party subdomain
served by tinydns and axfrdns, to trigger DNS responses containing
arbitrary records via crafted zone data for this subdomain.

This got fixed with Debian's 1.05-5, however in Intrepid we still have the vulnerable 1.05-2.

See http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0858
and http://lists.debian.org/debian-security-announce/2009/msg00144.html

CVE References

Revision history for this message
Andreas Moog (ampelbein) wrote :

djbdns (1:1.05-2ubuntu0.1) intrepid-security; urgency=low

  * SECURITY UPDATE: Matthew Dempsky discovered that Daniel J. Bernstein's
    djbdns, a Domain Name System server, does not constrain offsets in the
    required manner, which allows remote attackers with control over a
    third-party subdomain served by tinydns and axfrdns, to trigger DNS
    responses containing arbitrary records via crafted zone data for this
    subdomain. (LP: #399012)
    - CVE-2009-0858
    - http://shinobi.dempsky.org/~matthew/djbdns-bug/patch

 -- Andreas Moog <email address hidden> Mon, 13 Jul 2009 22:55:59 +0200

Changed in djbdns (Ubuntu):
importance: Undecided → Medium
status: New → In Progress
Andreas Moog (ampelbein)
visibility: private → public
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package djbdns - 1:1.05-2ubuntu0.1

---------------
djbdns (1:1.05-2ubuntu0.1) intrepid-security; urgency=low

  * SECURITY UPDATE: Matthew Dempsky discovered that Daniel J. Bernstein's
    djbdns, a Domain Name System server, does not constrain offsets in the
    required manner, which allows remote attackers with control over a
    third-party subdomain served by tinydns and axfrdns, to trigger DNS
    responses containing arbitrary records via crafted zone data for this
    subdomain. (LP: #399012)
    - CVE-2009-0858
    - http://shinobi.dempsky.org/~matthew/djbdns-bug/patch

 -- Andreas Moog <email address hidden> Mon, 13 Jul 2009 22:55:59 +0200

Changed in djbdns (Ubuntu):
status: In Progress → Fix Released
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.