Mandrake Linux Security Advisory : bind (MDKSA-2006:207)

This script is Copyright (C) 2007-2016 Tenable Network Security, Inc.


Synopsis :

The remote Mandrake Linux host is missing one or more security
updates.

Description :

The BIND DNS server is vulnerable to the recently-discovered OpenSSL
RSA signature verification problem (CVE-2006-4339). BIND uses RSA
cryptography as part of its DNSSEC implementation. As a result, to
resolve the security issue, these packages need to be upgraded and for
both KEY and DNSKEY record types, new RSASHA1 and RSAMD5 keys need to
be generated using the '-e' option of dnssec-keygen, if the current
keys were generated using the default exponent of 3.

You are able to determine if your keys are vulnerable by looking at
the algorithm (1 or 5) and the first three characters of the Base64
encoded RSA key. RSAMD5 (1) and RSASHA1 (5) keys that start with
'AQM', 'AQN', 'AQO', or 'AQP' are vulnerable.

See also :

http://marc.info/?l=bind-announce&m=116253119512445

Solution :

Update the affected bind, bind-devel and / or bind-utils packages.

Risk factor :

Medium / CVSS Base Score : 5.8
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:P)
CVSS Temporal Score : 5.0
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Family: Mandriva Local Security Checks

Nessus Plugin ID: 24592 (mandrake_MDKSA-2006-207.nasl)

Bugtraq ID: 19849

CVE ID: CVE-2006-4339
CVE-2006-5201
CVE-2006-7140

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now