[NBLUG/talk] [Mark_Andrews@isc.org: Internet Software Consortium Security Advisory: 5 March 2003]

Eric Eisenhart eric at nblug.org
Thu Mar 6 11:53:01 PST 2003


Mike: here's the other message I got from the bind-announce mailing list.

----- Forwarded message from Mark_Andrews at isc.org -----

To: bind-announce at isc.org
From: Mark_Andrews at isc.org
Subject: Internet Software Consortium Security Advisory: 5 March 2003

		Internet Software Consortium Security Advisory.
			     Status Update
			     5 March 2003

	BIND 9.2.2 was released which contains fixes for previously
	announced vulnerabilities.

	These were a remote buffer overflow documented in CERT advisory
	[CERT CA-2002-19] and enforcement of the minimum OpenSSL version
	[CERT CA-2002-23].

	http://www.cert.org/advisories/CA-2002-19.html
	http://www.cert.org/advisories/CA-2002-23.html


	[CERT CA-2002-19]:

	BIND 9.2.0 and BIND 9.2.1 needs to be upgraded if you have not
	already applied the workaround listed in [CERT CA-2002-19] and
	you enabled libbind by specifying "configure --enable-libbind"
	when you built BIND 9.2.0 or BIND 9.2.1.


	[CERT CA-2002-23]:

	BIND 9.[01].x needs to be upgraded if you have not applied the
	workaround listed in [CA-2002-23].  BIND 9.2.2 enforces a
	minimum OpenSSL version at compile time.

	BIND 9.2.0 and BIND 9.2.1 need to be upgraded if you built BIND
	with a vulnerable version of OpenSSL, "configure --with-openssl".
	BIND 9.2.2 enforces a minimum OpenSSL version at compile time.

	You can test to see if BIND was built with OpenSSL by running:

		dnssec-keygen -a rsa -b 512 -n zone foo

	If the command returns an error message which contains "built with
	no crypto support" then BIND was NOT linked against OpenSSL. This
	does NOT check the OpenSSL version in use.

	If you are in doubt about your current BIND status upgrade.

	The current BIND version can be found via:
	http://www.isc.org/products/BIND/

	The current BIND security page can be found via:
	http://www.isc.org/products/BIND/bind-security.html



----- End forwarded message -----



More information about the talk mailing list