Subject: Re: DNS vulnerable?
To: Mike Cheponis <mac@Wireless.Com>
From: ali (Anders Lindgren) <dat94ali@ludat.lth.se>
List: netbsd-help
Date: 01/30/2001 02:33:20
On Mon, 29 Jan 2001, Mike Cheponis wrote:

> Are we vulnerable?  Here's an excerpt of WSJ article.  -Mike

The named shipped with 1.5 appears to be 8.2.2-P7, which is
indeed vulnerable. In fact, pretty much all 8.2.x appears
to be vulnerable. From http://www.isc.org/products/BIND/bind-security.html

Name: "tsig bug"

  Versions affected:                           
      8.2, 8.2-P1, 8.2.1, 8.2.2-P1, 8.2.2-P2, 8.2.2-P3, 8.2.2-P4,
      8.2.2-P5, 8.2.2-P6, 8.2.2-P7, and all 8.2.3-betas

  Severity:
      CRITICAL

  Exploitable:                       
      Remotely

  Type:                             
      Access possible.

  Description:
      It is possible to overflow a buffer handling TSIG signed
      queries, thereby obtaining access to the system. 

  Workarounds:
      None. 

  Active Exploits:
      Exploits for this bug exist. 

..personally I had already built BIND-9.0.1 on my NetBSD-1.4.2 box
as soon as I needed a named, since there are other known bugs in
pretty much all 8.x versions (check the above URL, it's got a nice
bug-table in the bottom of the page).

-- 
/ali: Computer Science Major and aspiring cartoonist. :-) 
(dept) dat94ali@ludat.lth.se - http://www.ludat.lth.se/~dat94ali
(home) ali@h543.sparta.lu.se - http://h543.sparta.lu.se/
* A4000/040-40/CV3D/Ariadne·AmigaOS·NetBSD·A3000/040-25/Ariadne *