USN-3346-1: bind9 vulnerabilities

Ubuntu Security Notice USN-3346-1

29th June, 2017

bind9 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 17.04
  • Ubuntu 16.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS

Summary

Bind could be made to serve incorrect information or expose sensitive information over the network.

Software description

  • bind9 - Internet Domain Name Server

Details

Clément Berthaux discovered that Bind did not correctly check TSIG
authentication for zone update requests. An attacker could use this
to improperly perform zone updates. (CVE-2017-3143)

Clément Berthaux discovered that Bind did not correctly check TSIG
authentication for zone transfer requests. An attacker could use this
to improperly transfer entire zones. (CVE-2017-3142)

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 17.04:
bind9 1:9.10.3.dfsg.P4-10.1ubuntu5.1
Ubuntu 16.10:
bind9 1:9.10.3.dfsg.P4-10.1ubuntu1.7
Ubuntu 16.04 LTS:
bind9 1:9.10.3.dfsg.P4-8ubuntu1.7
Ubuntu 14.04 LTS:
bind9 1:9.9.5.dfsg-3ubuntu0.15

To update your system, please follow these instructions: http://ift.tt/17VXqjU.

After a standard system update you need to restart Bind to make
all the necessary changes.

References

CVE-2017-3142, CVE-2017-3143



from Ubuntu Security Notices http://ift.tt/2tviqzM