Mandrake Linux Security Advisory : bind (MDKSA-2006:207)

medium Nessus Plugin ID 24592

Synopsis

The remote Mandrake Linux host is missing one or more security updates.

Description

The BIND DNS server is vulnerable to the recently-discovered OpenSSL RSA signature verification problem (CVE-2006-4339). BIND uses RSA cryptography as part of its DNSSEC implementation. As a result, to resolve the security issue, these packages need to be upgraded and for both KEY and DNSKEY record types, new RSASHA1 and RSAMD5 keys need to be generated using the '-e' option of dnssec-keygen, if the current keys were generated using the default exponent of 3.

You are able to determine if your keys are vulnerable by looking at the algorithm (1 or 5) and the first three characters of the Base64 encoded RSA key. RSAMD5 (1) and RSASHA1 (5) keys that start with 'AQM', 'AQN', 'AQO', or 'AQP' are vulnerable.

Solution

Update the affected bind, bind-devel and / or bind-utils packages.

See Also

https://marc.info/?l=bind-announce&m=116253119512445

Plugin Details

Severity: Medium

ID: 24592

File Name: mandrake_MDKSA-2006-207.nasl

Version: 1.21

Type: local

Published: 2/18/2007

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:bind-utils, p-cpe:/a:mandriva:linux:bind-devel, cpe:/o:mandriva:linux:2006, cpe:/o:mandriva:linux:2007, p-cpe:/a:mandriva:linux:bind

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 11/14/2006

Reference Information

CVE: CVE-2006-4339, CVE-2006-5201, CVE-2006-7140

BID: 19849

CWE: 310

MDKSA: 2006:207