Lucene search

K
centosCentOS ProjectCESA-2008:0533
HistoryJul 08, 2008 - 10:25 p.m.

bind, caching, selinux security update

2008-07-0822:25:27
CentOS Project
lists.centos.org
53

6.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.133 Low

EPSS

Percentile

95.5%

CentOS Errata and Security Advisory CESA-2008:0533

ISC BIND (Berkeley Internet Name Domain) is an implementation of the DNS
(Domain Name System) protocols.

The DNS protocol protects against spoofing attacks by requiring an attacker
to predict both the DNS transaction ID and UDP source port of a request. In
recent years, a number of papers have found problems with DNS
implementations which make it easier for an attacker to perform DNS
cache-poisoning attacks.

Previous versions of BIND did not use randomized UDP source ports. If an
attacker was able to predict the random DNS transaction ID, this could make
DNS cache-poisoning attacks easier. In order to provide more resilience,
BIND has been updated to use a range of random UDP source ports.
(CVE-2008-1447)

Note: This errata also updates SELinux policy on Red Hat Enterprise Linux 4
and 5 to allow BIND to use random UDP source ports.

Users of BIND are advised to upgrade to these updated packages, which
contain a backported patch to add this functionality.

Red Hat would like to thank Dan Kaminsky for reporting this issue.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2008-July/077238.html
https://lists.centos.org/pipermail/centos-announce/2008-July/077239.html
https://lists.centos.org/pipermail/centos-announce/2008-July/077240.html
https://lists.centos.org/pipermail/centos-announce/2008-July/077241.html
https://lists.centos.org/pipermail/centos-announce/2008-July/077242.html
https://lists.centos.org/pipermail/centos-announce/2008-July/077243.html
https://lists.centos.org/pipermail/centos-announce/2008-July/077245.html
https://lists.centos.org/pipermail/centos-announce/2008-July/077246.html
https://lists.centos.org/pipermail/centos-announce/2008-July/077250.html
https://lists.centos.org/pipermail/centos-announce/2008-July/077251.html
https://lists.centos.org/pipermail/centos-announce/2008-July/077252.html
https://lists.centos.org/pipermail/centos-announce/2008-July/077253.html
https://lists.centos.org/pipermail/centos-announce/2008-July/090017.html
https://lists.centos.org/pipermail/centos-announce/2008-July/090018.html

Affected packages:
bind
bind-chroot
bind-devel
bind-libbind-devel
bind-libs
bind-sdb
bind-utils
caching-nameserver
selinux-policy
selinux-policy-devel
selinux-policy-mls
selinux-policy-strict
selinux-policy-targeted
selinux-policy-targeted-sources

Upstream details at:
https://access.redhat.com/errata/RHSA-2008:0533

6.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.133 Low

EPSS

Percentile

95.5%