[nsd-users] NSD 3.2.2 release [critical]

Matthijs Mekking matthijs at NLnetLabs.nl
Mon May 18 13:59:58 UTC 2009


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Dear NSD users and maintainers,

We have released version 3.2.2. of NSD. This is *critical* bugfix
release. One of the bugs is a one-byte buffer overflow that allows a
carefully crafted exploit to take down your name-server. It is highly
unlikely that the one-byte-off issue can lead to other (system) exploits.

The bug affects all version of NSD 2.0.0 to 3.2.1. Whether the bug can
be exploited to depends on various aspects of the OS and is therefore
distribution and compiler dependent.

For more information:
http://www.nlnetlabs.nl/publications/NSD_vulnerability_announcement.html

We strongly recommend you to update your systems to the latest version.
If you have reasons for not running the latest version of NSD, we
strongly advise you to at least apply the patch that resolves the
critical bug.

The source and patches are available at our website:

	http://www.nlnetlabs.nl/downloads/nsd/nsd-3.2.2.tar.gz
	http://www.nlnetlabs.nl/downloads/nsd/nsd-3.2.1-vuln.patch
	http://www.nlnetlabs.nl/downloads/nsd/nsd-2.3.7-vuln.patch

SHA1 checksum (source): 23fc0be5d447ea852acd49f64743c96403a091fa
SHA1 checksum (patch 3.2.1): 20cb9fc73fae951a9cc25822c48b17ca1d956119
SHA1 checksum (patch 2.3.7): 94887d212621b458a86ad5b086eec9240477

Note that NSD 2.X is feature frozen and security patches may not be made
available in future events.

We acknowledge and thank Ilja von Sprundel of IOActive for finding and
reporting this bug.

Matthijs Mekking
NLnet Labs

RELNOTES:

BUG FIXES:
- - Off-by-one buffer overflow fix while processing the QUESTION section.
- - Return BADVERS when NSD does not implement the VERSION level of the
  request, instead of 0x1<FORMERR>.
- - Bugfix #234.
- - Bugfix #235.
- - Reset 'error occurred' after notifying an error occurred at the $TTL
  or $ORIGIN directive (Otherwise, the whole zone is skipped because the
  error is reset after reading the SOA).
- - Minor bugfixes.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iQEcBAEBAgAGBQJKEWnKAAoJEA8yVCPsQCW5VQoIAN296LcduHZCVPaQUcYwOPj+
TlAniGQ+gaG3VoM99GJcxDWo4zKBPEepr4eEoU+rItUYRmBLndEjUvBArU2jFk9y
hVWBaanfOaSgL367mAYRb2ZfzdjJaOUwJWr6VphTBXx88cOBMP9ljvKkTL5T/yxN
v1wjyKp1Fpkmp6sTWIFvcBXuWMs6K/1FLg6pvqsFC2nQrGptyCXkqZrwtC7lTny0
P0RpoCuk2LBre4SloNLtr1mgoQZDhZEzXbCY5vwt/BZwwXt+rsxHmcx2Or9p+Gx9
gyCKkXQMM4xPTth/llUxcbczzcn05CBZfIz6knl0R99zV2xZt2JctTQ6x7Ipko8=
=6E0k
-----END PGP SIGNATURE-----



More information about the nsd-users mailing list