Debian DSA-1831-1 : djbdns - programming error

medium Nessus Plugin ID 44696

Language:

Synopsis

The remote Debian host is missing a security-related update.

Description

Matthew Dempsky discovered that Daniel J. Bernstein's djbdns, a Domain Name System server, does not constrain offsets in the required manner, which allows remote attackers with control over a third-party subdomain served by tinydns and axfrdns, to trigger DNS responses containing arbitrary records via crafted zone data for this subdomain.

Solution

Upgrade the djbdns package.

The old stable distribution (etch) does not contain djbdns.

For the stable distribution (lenny), this problem has been fixed in version 1.05-4+lenny1.

See Also

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=518169

https://www.debian.org/security/2009/dsa-1831

Plugin Details

Severity: Medium

ID: 44696

File Name: debian_DSA-1831.nasl

Version: 1.9

Type: local

Agent: unix

Published: 2/24/2010

Updated: 1/4/2021

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:djbdns, cpe:/o:debian:debian_linux:5.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Patch Publication Date: 7/13/2009

Reference Information

CVE: CVE-2009-0858

CWE: 20

DSA: 1831