Solution
Please Install the Updated Packages.
Insight
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named) a resolver
library (routines for applications to use when interfacing with DNS) and
tools for verifying that the DNS server is operating correctly.
It was discovered that the bind packages created the " rndc.key"
file with
insecure file permissions. This allowed any local user to read the content of this file. A local user could use this flaw to control some aspects of the named daemon by using the rndc utility, for example, stopping the named daemon. This problem did not affect systems with the bind-chroot package installed. (CVE-2007-6283)
A buffer overflow flaw was discovered in the " inet_network()"
function, as
implemented by libbind. An attacker could use this flaw to crash an application calling this function, with an argument provided from an untrusted source. (CVE-2008-0122)
As well, these updated packages fix the following bugs:
* when using an LDAP backend, missing function declarations caused segmentation faults, due to stripped pointers on machines where pointers are longer than integers.
* starting named may have resulted in named crashing, due to a race condition during D-BUS connection initialization. This has been resolved in these updated packages.
* the named init script returned incorrect error codes, causing the "
status"
command to return an incorrect status. In these updated packages, the named init script is Linux Standard Base (LSB) compliant.
* in these updated packages, the "
rndc [command] [zone]"
command, where
[command] is an rndc command, and [zone] is the specified zone, will find the [zone] if the zone is unique to all views.
* the default named log rotation script did not work correctly when using the bind-chroot package. In these updated packages, installing bind-chroot creates the symbolic link "
/var/log/named.log"
, which points
to "
/var/named/chroot/var/log/named.log"
, which resolves this issue.
* a previous bind update incorrectly changed the permissions on the "
/etc/openldap/schema/dnszone.schema"
file to mode 640, instead of mode
644, which resulted in OpenLDAP not being able to start. In these updated packages, the permissions are correctly set to mode 644.
* the "
checkconfig"
parameter was missing in the named usage report. For example, running the "
service named"
command did not return "
checkconfi ...
Description truncated, for more information please check the Reference URL
Affected
bind on Red Hat Enterprise Linux (v. 5 server)
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2007-6283, CVE-2008-0122 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities