______________________________________________________________________________

                        SuSE Security Announcement

        Package: bind8 < 8.2.2p2 + bind4 < 4.9.7-REL
        Date:    Fri, 12 Nov 1999 01:56:04 GMT

        Affected SuSE versions: all
        Vulnerability Type:     remote root compromise, denial of service
	SuSE default package:   yes (not activated by default)
	Other affected systems: all unix systems using bind8
______________________________________________________________________________

A security hole was discovered in the package mentioned above.
Please update as soon as possible or disable the service if you are using
this software on your SuSE Linux installation(s).

Other Linux distributions or operating systems might be affected as
well, please contact your vendor for information about this issue.

Please note, that that we provide this information on "as-is" basis only.
There is no warranty whatsoever and no liability for any direct, indirect or
incidental damage arising from this information or the installation of
the update package.
_____________________________________________________________________________

1. Problem Description

  Several vulnerabilities were found within bind4 and bind8.

2. Impact

  All bind4 and bind8 versions can be crashed in certain circumstances.
  bind8 8.2 until 8.2.1 can be compromised remotely through a buffer
  overflow.

3. Solution

  Updated the package from our FTP server.
______________________________________________________________________________

Please verify these md5 checksums of the updates before installing:
(For SuSE 6.0, please use the 6.1 updates)

76afbb91c001880687e47f4dc0404807  
a5f453329a023221476143956cf11b2d  
f510a224c9f45014853c128bb0f0d0da  
/5.3/n1/bind-4.9.7-101.i386.rpm
1e6234a05cbe7dd3c4e207743d3b4f6f  
/5.3/n1/bind8-8.2.2-8.i386.rpm
036fbc51c9902f7fe5cba1db5ef171e0  
/5.3/n1/bindutil-8.2.2-8.i386.rpm
bca65a23d1e6ffe284956549e8eda731  
/6.1/n1/bind-4.9.7-101.i386.rpm
d0bb5a9d2e4a0bb918856681828d677a  
23a77b3103ce7cae0003d632a228ce87  
/6.1/n1/bindutil-8.2.2-8.i386.rpm
3a69c1344e970d1edb580420614d052f  
/6.2/n1/bind-4.9.7-101.i386.rpm
e621dff7568fc5a6933e19df40283d0a  
/6.2/n1/bind8-8.2.2-8.i386.rpm
e3c23546e73f3cffeea662c9de953d99  
/6.2/n1/bindutil-8.2.2-8.i386.rpm
______________________________________________________________________________

You can find updates on our ftp-Server:

   for Intel processors    for Alpha processors
or try the following web pages for a list of mirrors:
  http://www.suse.de/ftp.html
  
Our webpage for patches:
  http://www.suse.de/patches/index.html

Our webpage for security announcements:
  http://www.suse.de/security

If you want to report vulnerabilities, please contact
  security@suse.de
______________________________________________________________________________

Security hole in bind8 < 8.2.2p2 and bind4 < 4.9.7-REL

December 8, 1999
Several vulnerabilities were found within bind4 and bind8.

Summary

______________________________________________________________________________

                        SuSE Security Announcement

        Package: bind8 < 8.2.2p2 + bind4 < 4.9.7-REL
        Date:    Fri, 12 Nov 1999 01:56:04 GMT

        Affected SuSE versions: all
        Vulnerability Type:     remote root compromise, denial of service
	SuSE default package:   yes (not activated by default)
	Other affected systems: all unix systems using bind8
______________________________________________________________________________

A security hole was discovered in the package mentioned above.
Please update as soon as possible or disable the service if you are using
this software on your SuSE Linux installation(s).

Other Linux distributions or operating systems might be affected as
well, please contact your vendor for information about this issue.

Please note, that that we provide this information on "as-is" basis only.
There is no warranty whatsoever and no liability for any direct, indirect or
incidental damage arising from this information or the installation of
the update package.
_____________________________________________________________________________

1. Problem Description

  Several vulnerabilities were found within bind4 and bind8.

2. Impact

  All bind4 and bind8 versions can be crashed in certain circumstances.
  bind8 8.2 until 8.2.1 can be compromised remotely through a buffer
  overflow.

3. Solution

  Updated the package from our FTP server.
______________________________________________________________________________

Please verify these md5 checksums of the updates before installing:
(For SuSE 6.0, please use the 6.1 updates)

76afbb91c001880687e47f4dc0404807  
a5f453329a023221476143956cf11b2d  
f510a224c9f45014853c128bb0f0d0da  
/5.3/n1/bind-4.9.7-101.i386.rpm
1e6234a05cbe7dd3c4e207743d3b4f6f  
/5.3/n1/bind8-8.2.2-8.i386.rpm
036fbc51c9902f7fe5cba1db5ef171e0  
/5.3/n1/bindutil-8.2.2-8.i386.rpm
bca65a23d1e6ffe284956549e8eda731  
/6.1/n1/bind-4.9.7-101.i386.rpm
d0bb5a9d2e4a0bb918856681828d677a  
23a77b3103ce7cae0003d632a228ce87  
/6.1/n1/bindutil-8.2.2-8.i386.rpm
3a69c1344e970d1edb580420614d052f  
/6.2/n1/bind-4.9.7-101.i386.rpm
e621dff7568fc5a6933e19df40283d0a  
/6.2/n1/bind8-8.2.2-8.i386.rpm
e3c23546e73f3cffeea662c9de953d99  
/6.2/n1/bindutil-8.2.2-8.i386.rpm
______________________________________________________________________________

You can find updates on our ftp-Server:

   for Intel processors    for Alpha processors
or try the following web pages for a list of mirrors:
  http://www.suse.de/ftp.html
  
Our webpage for patches:
  http://www.suse.de/patches/index.html

Our webpage for security announcements:
  http://www.suse.de/security

If you want to report vulnerabilities, please contact
  security@suse.de
______________________________________________________________________________

References

Severity

Related News