Mandriva Linux Security Advisory : bind (MDVSA-2008:139)

Medium Nessus Plugin ID 36526


The remote Mandriva Linux host is missing one or more security updates.


A weakness was found in the DNS protocol by Dan Kaminsky. A remote attacker could exploit this weakness to spoof DNS entries and poison DNS caches. This could be used to misdirect users and services; i.e.
for web and email traffic (CVE-2008-1447).

This update provides the latest stable BIND releases for all platforms except Corporate Server/Desktop 3.0 and MNF2, which have been patched to correct the issue.


Update the affected packages.

Plugin Details

Severity: Medium

ID: 36526

File Name: mandriva_MDVSA-2008-139.nasl

Version: $Revision: 1.19 $

Type: local

Published: 2009/04/23

Modified: 2015/01/14

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:bind, p-cpe:/a:mandriva:linux:bind-devel, p-cpe:/a:mandriva:linux:bind-doc, p-cpe:/a:mandriva:linux:bind-utils, cpe:/o:mandriva:linux:2007.1, cpe:/o:mandriva:linux:2008.0, cpe:/o:mandriva:linux:2008.1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Patch Publication Date: 2008/07/09

Reference Information

CVE: CVE-2008-1447, CVE-2008-4194

MDVSA: 2008:139

IAVA: 2008-A-0045

CWE: 399