Lucene search

K
debianDebianDEBIAN:5046C34B6483326B151248BE8176C7E6:CD6ED
HistoryJan 09, 2010 - 12:36 p.m.

[Backports-security-announce] Security Update for pdns-recursor

2010-01-0912:36:38
lists.debian.org
11

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.041 Low

EPSS

Percentile

91.2%

Gerfried Fuchs uploaded new packages for pdns-recursor which fixed the
following security problems:

CVE-2009-4009

A buffer overflow can be exploited to crash the daemon, or potentially
execute arbitrary code.

CVE-2009-4010

A cache poisoning vulnerability may allow attackers to trick the
server into serving incorrect DNS data.

For the etch-backports distribution the problems have been fixed in
version 3.1.7-1+lenny1~bpo40+1.

For the sid distribution the problems have been fixed in version
3.1.7.2-1.

Upgrade instructions

If you don't use pinning (see [1]) you have to update the packages
manually via "apt-get -t lenny-backports install <packagelist>" with the
packagelist of your installed packages affected by this update.
[1] <http://backports.org/dokuwiki/doku.php?id=instructions&gt;

We recommend to pin the backports repository to 200 so that new versions
of installed backports will be installed automatically:

Package: *
Pin: release a=etch-backports
Pin-Priority: 200

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.041 Low

EPSS

Percentile

91.2%