USN-491-1: Bind vulnerability
25 July 2007
Bind vulnerability
Releases
Details
A flaw was discovered in Bind's sequence number generator. A remote
attacker could calculate future sequence numbers and send forged DNS
query responses. This could lead to client connections being directed
to attacker-controlled hosts, resulting in credential theft and other
attacks.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 7.04
-
libdns22
-
1:9.3.4-2ubuntu2.1
Ubuntu 6.10
-
libdns21
-
1:9.3.2-2ubuntu3.2
Ubuntu 6.06
-
libdns21
-
1:9.3.2-2ubuntu1.3
In general, a standard system upgrade is sufficient to effect the
necessary changes.