Multiple Vendor BIND 8.2.2-P5 Denial of Service Vulnerability

Solution:
Contributed patches:

Unofficial patch by Akatosh <akatosh@rains.net> :

--- src/bin/named/ns_xfr.c Wed Oct 13 12:39:13 1999
+++ src.new/bin/named/ns_xfr.c Wed Nov 8 16:53:38 2000
@@ -97,7 +97,8 @@
"unsupported XFR (type %s) of \"%s\" (%s) to %s",
p_type(type), zones[zone].z_origin, p_class(class),
sin_ntoa(qsp->s_from));
- goto abort;
+ (void) shutdown(qsp->s_rfd, 2);
+ goto abort2;
}

#ifdef SO_SNDBUF
@@ -195,11 +196,13 @@
type = ns_t_axfr;
}
if (sx_pushlev(qsp, znp) < 0) {
+
abort:
(void) shutdown(qsp->s_rfd, 2);
sq_remove(qsp);
return;
}
+ abort2:
if (type != ns_t_ixfr)
(void) sq_writeh(qsp, sx_sendsoa);
else

This unofficial patch contributed by Greg Woods <woods@weird.com> :

*** src/bin/named/ns_xfr.c 1999/11/11 06:06:09 1.1.1.3
--- src/bin/named/ns_xfr.c 2000/11/09 20:49:45
***************
*** 97,103 ****
"unsupported XFR (type %s) of \"%s\" (%s) to %s",
p_type(type), zones[zone].z_origin, p_class(class),
sin_ntoa(qsp->s_from));
! goto abort;
}

#ifdef SO_SNDBUF
--- 97,104 ----
"unsupported XFR (type %s) of \"%s\" (%s) to %s",
p_type(type), zones[zone].z_origin, p_class(class),
sin_ntoa(qsp->s_from));
! (void) shutdown(qsp->s_rfd, 2);
! return;
}

#ifdef SO_SNDBUF


RedHat bind-8.1.2-5.i386.rpm

RedHat bind-8.2.1-7.i386.rpm

RedHat bind-8.2.2_P5-25.i386.rpm

RedHat bind-8.2-6.i386.rpm

RedHat bind-8.2.2_P5-9.i386.rpm

ISC BIND 8.2.2 p5


 

Privacy Statement
Copyright 2010, SecurityFocus