From owner-freebsd-bugs@FreeBSD.ORG Tue Jul 5 16:30:10 2011 Return-Path: Delivered-To: freebsd-bugs@hub.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 3AA991065674 for ; Tue, 5 Jul 2011 16:30:10 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:4f8:fff6::28]) by mx1.freebsd.org (Postfix) with ESMTP id 11F978FC1D for ; Tue, 5 Jul 2011 16:30:10 +0000 (UTC) Received: from freefall.freebsd.org (localhost [127.0.0.1]) by freefall.freebsd.org (8.14.4/8.14.4) with ESMTP id p65GU9g1001112 for ; Tue, 5 Jul 2011 16:30:09 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.14.4/8.14.4/Submit) id p65GU9wf001109; Tue, 5 Jul 2011 16:30:09 GMT (envelope-from gnats) Resent-Date: Tue, 5 Jul 2011 16:30:09 GMT Resent-Message-Id: <201107051630.p65GU9wf001109@freefall.freebsd.org> Resent-From: FreeBSD-gnats-submit@FreeBSD.org (GNATS Filer) Resent-To: freebsd-bugs@FreeBSD.org Resent-Reply-To: FreeBSD-gnats-submit@FreeBSD.org, Ryan Steinmetz Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 7DC99106566B for ; Tue, 5 Jul 2011 16:27:57 +0000 (UTC) (envelope-from nobody@FreeBSD.org) Received: from red.freebsd.org (red.freebsd.org [IPv6:2001:4f8:fff6::22]) by mx1.freebsd.org (Postfix) with ESMTP id 6E2FF8FC18 for ; Tue, 5 Jul 2011 16:27:57 +0000 (UTC) Received: from red.freebsd.org (localhost [127.0.0.1]) by red.freebsd.org (8.14.4/8.14.4) with ESMTP id p65GRt0K025744 for ; Tue, 5 Jul 2011 16:27:55 GMT (envelope-from nobody@red.freebsd.org) Received: (from nobody@localhost) by red.freebsd.org (8.14.4/8.14.4/Submit) id p65GRteB025743; Tue, 5 Jul 2011 16:27:55 GMT (envelope-from nobody) Message-Id: <201107051627.p65GRteB025743@red.freebsd.org> Date: Tue, 5 Jul 2011 16:27:55 GMT From: Ryan Steinmetz To: freebsd-gnats-submit@FreeBSD.org X-Send-Pr-Version: www-3.1 Cc: Subject: misc/158672: [vuxml] BIND CVE-2011-2464 + CVE-2011-2465 X-BeenThere: freebsd-bugs@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 05 Jul 2011 16:30:10 -0000 >Number: 158672 >Category: misc >Synopsis: [vuxml] BIND CVE-2011-2464 + CVE-2011-2465 >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: update >Submitter-Id: current-users >Arrival-Date: Tue Jul 05 16:30:09 UTC 2011 >Closed-Date: >Last-Modified: >Originator: Ryan Steinmetz >Release: 8.2-RELEASE >Organization: Rochester Institute of Technology >Environment: >Description: -Document vulnerabilities in dns/bind96, dns/bind97 and dns/bind98 as well as FreeBSD versions affected by these CVEs -CVE-2011-2464 and CVE-2011-2465 -Please be aware that this PR relies on the creation of FreeBSD-SA-11:03.bind >How-To-Repeat: >Fix: Patch attached with submission follows: Index: vuln.xml =================================================================== RCS file: /home/ncvs/ports/security/vuxml/vuln.xml,v retrieving revision 1.2396 diff -u -r1.2396 vuln.xml --- vuln.xml 3 Jul 2011 13:32:49 -0000 1.2396 +++ vuln.xml 5 Jul 2011 16:19:59 -0000 @@ -34,6 +34,79 @@ --> + + BIND -- Remote DoS with certain RPZ configurations + + + bind98 + 9.8.0.4 + + + + +

ISC reports:

+
+

Two defects were discovered in ISC's BIND 9 code. These defects only affect BIND 9 + servers which have recursion enabled and which use a specific feature of the software + known as Response Policy Zones (RPZ) and where the RPZ zone contains a specific + rule/action pattern.

+
+ +
+ + CVE-2011-2465 + http://www.isc.org/software/bind/advisories/cve-2011-2465 + + + 2011-07-05 + 2011-07-05 + +
+ + + BIND -- Remote DoS against authoritative and recursive servers + + + bind96 + 9.6.3.1.ESV.R4.3 + + + bind97 + 9.7.3.3 + + + bind98 + 9.8.0.4 + + + FreeBSD + 7.37.3_7 + 7.47.4_3 + 8.18.1_5 + 8.28.2_3 + + + + +

ISC reports:

+
+

A defect in the affected BIND 9 versions allows an attacker to remotely cause the "named" + process to exit using a specially crafted packet.

+

This defect affects both recursive and authoritative servers.

+
+ +
+ + SA-11:03.bind + CVE-2011-2464 + http://www.isc.org/software/bind/advisories/cve-2011-2464 + + + 2011-07-05 + 2011-07-05 + +
+ phpmyadmin -- multiple vulnerabilities >Release-Note: >Audit-Trail: >Unformatted: