USN-706-1: Bind vulnerability
9 January 2009
Bind vulnerability
Releases
Packages
- bind9 -
Details
It was discovered that Bind did not properly perform signature verification.
When DNSSEC with DSA signatures are in use, a remote attacker could exploit
this to bypass signature validation to spoof DNS entries and poison DNS
caches. Among other things, this could lead to misdirected email and web
traffic.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 8.10
Ubuntu 8.04
Ubuntu 7.10
Ubuntu 6.06
In general, a standard system upgrade is sufficient to effect the
necessary changes.