Do the RAQ servers run this version of BIND? How can one tell what version 
of BIND is running?

Thanks

>>-----BEGIN PGP SIGNED MESSAGE-----
>>
>>CERT Advisory CA-2002-15 Denial-of-Service Vulnerability in ISC BIND 9
>>
>>    Original release date: June 04, 2002
>>    Last revised: --
>>    Source: CERT/CC
>>
>>    A complete revision history can be found at the end of this file.
>>
>>Systems Affected
>>
>>      * Domain Name System (DNS) servers running ISC BIND 9 prior to 9.2.1
>>        Because  the  normal  operation  of  most services on the Internet
>>        depends  on  the  proper  operation of DNS servers, other services
>>        could be affected if this vulnerability is exploited.
>>
>>Overview
>>
>>    A  denial-of-service vulnerability exists in version 9 of the Internet
>>    Software  Consortium's  (ISC)  Berkeley  Internet  Name  Domain (BIND)
>>    server.  ISC  BIND  versions 8 and 4 are not affected. Exploiting this
>>    vulnerability will cause the BIND server to shut down.
>>
>>I. Description
>>
>>    BIND  is  an  implementation  of  the Domain Name System (DNS) that is
>>    maintained  by  the  ISC.  A vulnerability exists in version 9 of BIND
>>    that  allows  remote  attackers to shut down BIND servers. An attacker
>>    can  cause  the  shutdown by sending a specific DNS packet designed to
>>    trigger  an  internal  consistency  check. However, this vulnerability
>>    will  not allow an attacker to execute arbitrary code or write data to
>>    arbitrary locations in memory.
>>
>>    The  internal consistency check that triggers the shutdown occurs when
>>    the  rdataset  parameter  to  the  dns_message_findtype()  function in
>>    message.c  is  not  NULL as expected. The condition causes the code to
>>    assert an error message and call abort() to shut down the BIND server.
>>    It  is  also possible to accidentally trigger this vulnerability using
>>    common   queries   found  in  routine  operation,  especially  queries
>>    originating from SMTP servers.
>>
>>    A   vulnerability  note  describing  this  problem  can  be  found  at
>>    http://www.kb.cert.org/vuls/id/739123.    This    vulnerability   note
>>    includes  a  list  of  vendors  that  have  been  contacted about this
>>    vulnerability.
>>
>>    This vulnerability is also being referenced as CAN-2002-0400:
>>
>>    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0400
>>
>>II. Impact
>>
>>    Exploitation of this vulnerability will cause the BIND server to abort
>>    and  shut  down.  As  a  result, the BIND server will not be available
>>    unless it is restarted.
>>
>>III. Solution
>>
>>Apply a patch from your vendor
>>
>>    The  ISC  has released BIND version 9.2.1. The CERT/CC recommends that
>>    users  of  BIND  9  apply a patch from their vendor or upgrade to BIND
>>    9.2.1.
>>
>>Appendix A. - Vendor Information
>>
>>    This  appendix  contains  information  provided  by  vendors  for this
>>    advisory.  As  vendors  report new information to the CERT/CC, we will
>>    update this section and note the changes in our revision history. If a
>>    particular  vendor  is  not  listed  below, we have not received their
>>    comments.
>>
>>Apple
>>
>>      The version of BIND that ships in Mac OS X and Mac OS X Server does
>>      not contain this vulnerability.
>>
>>BSDI
>>
>>      Wind  River  Systems, Inc. does not include BIND 9 with any version
>>      of BSD/OS.
>>
>>Caldera
>>
>>      SCO  OpenServer  from Caldera does not ship BIND9, and is therefore
>>      not vulnerable.
>>      Caldera  Open  UNIX  does  ship  BIND9,  and  is vulnerable. We are
>>      investigating.
>>      Caldera  OpenLinux  does  not  ship  BIND9,  and  is  therefore not
>>      vulnerable.
>>
>>Compaq Computer Corporation
>>
>>      HP Alpha Server Products:
>>      HP Tru64 UNIX:
>>      Tru64  UNIX  is  not  vulnerable to this reported problem. HP Tru64
>>      UNIX ships with BIND 8.2.2-p5
>>      TCP/IP for HP OpenVms:
>>      TCP/IP   for   HP  OpenVms  is  not  vulnerable  to  this  reported
>>      problem.The  current  versions  of  TCP/IP for HP OpenVMS ship BIND
>>      8.2.2-p5
>>      HP NonStop Server:
>>      "HP  NonStop  Himalaya  is  not  vulnerable  to  this problem.  The
>>      'named' function of Domain Name Server (T6021) which is implemented
>>      for  HP  NonStop Himalaya is based on BIND 4.8.  NonStop DNS is the
>>      only Himalaya software product that includes 'named'."
>>
>>Cray
>>
>>      Cray, Inc. is not vulnerable since the BIND distributed with Unicos
>>      and Unicos/mk is not based on BIND 9.
>>
>>Engarde
>>
>>      Guardian  Digital  does  not ship BIND 9 in any versions of EnGarde
>>      Secure  Linux,  therefore  we are not vulnerable. All versions were
>>      shipped with BIND 8.
>>
>>F5 Networks, Inc.
>>
>>      F5  Networks' products do not include BIND 9, and are therefore not
>>      affected by this vulnerability.
>>
>>FreeBSD
>>
>>      The FreeBSD base system does not ship with ISC BIND 9. However, ISC
>>      BIND  9  is  available  in  the  FreeBSD  Ports  Collection.  It is
>>      currently at version 9.2.1 and is therefore unaffected.
>>
>>Hewlett-Packard Company
>>
>>      HP is Vulnerable, Solution investigation continuing..
>>
>>IBM
>>
>>      After  analysis  of the affected component, IBM has determined that
>>      the AIX bind deamon is not vulnerable to the attack as described in
>>      the CERT advisory.
>>
>>Internet Software Consortium
>>
>>      This  vulnerability  was found through routine bug analysis. BIND 9
>>      is  designed  to exit when it detects an internal consistency error
>>      to reduce the impact of bugs in the server. ISC strongly reccomends
>>      that  all BIND 9 users upgrade immediately to 9.2.1. BIND 9.2.1 can
>>      be found at http://www.isc.org/products/BIND/bind9.html.
>>
>>MandrakeSoft
>>
>>      Mandrake  Linux  8.x  ships with BIND9 and as such updated packages
>>      will be available as early as possible.
>>
>>Microsoft Corporation
>>
>>      Microsoft  has  reviewed  the  information and can confirm that our
>>      products are not affected by this vulnerability.
>>
>>NEC Corporation
>>
>>      sent on June 3, 2002
>>      [Server Products]
>>      * EWS/UP 48 Series operating system
>>         - is NOT vulnerable.
>>
>>NetBSD
>>
>>      NetBSD has not included Bind 9 in the base system of any release or
>>      -current development branch.
>>      Bind  9  is  available  from the 3rd party software system, pkgsrc.
>>      Users  who  have  installed  net/bind9  or net/bind9-current should
>>      update  to  a  fixed version. pkgsrc/security/audit-packages can be
>>      used to keep up to date with these types of issues.
>>
>>Network Appliance
>>
>>      All  NetApp  products  do  not  contain any BIND code, so no NetApp
>>      product is vulnerable to this problem.
>>
>>Nortel Networks Limited
>>
>>      Nortel  Networks  is  reviewing  its  portfolio to determine if any
>>      products  are  affected by the vulnerability noted in CERT Advisory
>>      CA-2002-15. A definitive statement will be issued shortly.
>>
>>Red Hat
>>
>>      Red  Hat distributed BIND 9 in Red Hat Linux versions 7.1, 7.2, and
>>      7.3.  We  are  currently working on producing errata packages, when
>>      complete these will be available along with our advisory at the URL
>>      below.   At the same time users of the Red Hat Network will be able
>>      to update their systems using the 'up2date' tool.
>>      http://rhn.redhat.com/errata/RHSA-2002-105.html
>>
>>Silicon Graphics, Inc.
>>
>>      IRIX does not ship with BIND9 and is not vulnerable.
>>
>>Sun Microsystems
>>
>>      Sun  does  not ship BIND 9 with any version of Solaris at this time
>>      and is therefore not affected by this issue.
>>
>>SuSE, Inc.
>>
>>      We  are  affected  by  the  bind9  DoS  issue  as  well. All of our
>>      currently  supported SuSE Linux products come with a bind9 package.
>>      We  will  release  an  announcement for the issue, coordinated with
>>      your timeframe and not before we see your official announcement.
>>
>>Unisphere Networks, Inc.
>>
>>      The  Unisphere  Networks  ERX  family  of  edge  routers  does  not
>>      implement  a  DNS  server  or  named  daemon  within the Unison OS.
>>      Additionally,  the  DNS client found on the ERX is not based on the
>>      ISC BIND code. Unisphere Networks has no reason to expect a similar
>>      problem exists in the DNS client implementation found on the ERX.
>>      _________________________________________________________________
>>
>>    The  CERT  Coordination Center thanks the Internet Software Consortium
>>    for notifying us about this vulnerability.
>>      _________________________________________________________________
>>
>>    Author: Ian A. Finlay
>>    ______________________________________________________________________
>>
>>    This document is available from:
>>    http://www.cert.org/advisories/CA-2002-15.html
>>    ______________________________________________________________________
>>
>>CERT/CC Contact Information
>>
>>    Email: [EMAIL PROTECTED]
>>           Phone: +1 412-268-7090 (24-hour hotline)
>>           Fax: +1 412-268-6989
>>           Postal address:
>>           CERT Coordination Center
>>           Software Engineering Institute
>>           Carnegie Mellon University
>>           Pittsburgh PA 15213-3890
>>           U.S.A.
>>
>>    CERT/CC   personnel   answer  the  hotline  08:00-17:00  EST(GMT-5)  /
>>    EDT(GMT-4)  Monday  through  Friday;  they are on call for emergencies
>>    during other hours, on U.S. holidays, and on weekends.
>>
>>Using encryption
>>
>>    We  strongly  urge you to encrypt sensitive information sent by email.
>>    Our public PGP key is available from
>>    http://www.cert.org/CERT_PGP.key
>>
>>    If  you  prefer  to  use  DES,  please  call the CERT hotline for more
>>    information.
>>
>>Getting security information
>>
>>    CERT  publications  and  other security information are available from
>>    our web site
>>    http://www.cert.org/
>>
>>    To  subscribe  to  the CERT mailing list for advisories and bulletins,
>>    send  email  to [EMAIL PROTECTED] Please include in the body of your
>>    message
>>
>>    subscribe cert-advisory
>>
>>    *  "CERT"  and  "CERT  Coordination Center" are registered in the U.S.
>>    Patent and Trademark Office.
>>    ______________________________________________________________________
>>
>>    NO WARRANTY
>>    Any  material furnished by Carnegie Mellon University and the Software
>>    Engineering  Institute  is  furnished  on  an  "as is" basis. Carnegie
>>    Mellon University makes no warranties of any kind, either expressed or
>>    implied  as  to  any matter including, but not limited to, warranty of
>>    fitness  for  a  particular purpose or merchantability, exclusivity or
>>    results  obtained from use of the material. Carnegie Mellon University
>>    does  not  make  any warranty of any kind with respect to freedom from
>>    patent, trademark, or copyright infringement.
>>      _________________________________________________________________
>>
>>    Conditions for use, disclaimers, and sponsorship information
>>
>>    Copyright 2002 Carnegie Mellon University.
>>
>>    Revision History
>>June 04, 2002:  Initial release
>>
>>-----BEGIN PGP SIGNATURE-----
>>Version: PGP 6.5.8
>>
>>iQCVAwUBPP0kn6CVPMXQI2HJAQFEyQP/fkgF01EWoE2JPDB3kPwLhSUSrM8XHNvQ
>>+vfuH8ZSUAiG0/g/zSGjeTt0NFYeeI6kMS7MQqS76ECaP93l7gR/zucShEkOKliy
>>4NHjoF34gPqPlDu6BAdh2xfl9q+LNdu8EHs8rjl1FqjvPKmL436tS0ToJXqXDpmx
>>/WHO3P3AwhM=
>>=M/6l
>>-----END PGP SIGNATURE-----

_______________________________________________
cobalt-developers mailing list
[EMAIL PROTECTED]
http://list.cobalt.com/mailman/listinfo/cobalt-developers

Reply via email to