What is Security Supplement p535243, the BIND BIND 9.4-ESV Update for UnixWare 7.1.4? KEYWORDS: unixware 7.1.4 714 security bind 9.4-ESV update supplement p535243 fz535243 dig nslookup hang SCOSA-2010.1 dns domain name server CVE-2009-0696 CVE-2009-4022 CVE-2010-0097 RELEASE: SCO Unixware Release 7.1.4 PROBLEM: What is Security Supplement p535243, the BIND 9.4-ESV Update for UnixWare 7.1.4? SOLUTION: The supplement brings Bind 9 up to date with the latest security fixes and also addresses an issue that can cause dig(1Mtcp) and nslookup(1Mtcp)to hang under certain circumstances. What follows is the Security Advisory for this fix: ______________________________________________________________________________ SCO Security Advisory Subject: BIND 9.4_ESV Update for UnixWare 7.1.4 Advisory number: SCOSA-2010.1 Issue date: 7th April 2010 Cross reference: fz535243 CVE-2009-0696, CVE-2009-4022 and CVE-2010-0097 ______________________________________________________________________________ 1. Problem Description Security Supplement p535243, the BIND 9.4-ESV Update for UnixWare 7.1.4 addresses the following issues: BIND 9 DNSSEC validation code could cause bogus NXDOMAIN responses CVE: CVE-2010-0097 CERT: VU#360341 BIND 9 Cache Update from Additional Section CVE: CVE-2009-4022 CERT: VU#418861 BIND Dynamic Update DoS CVE: CVE-2009-0696 CERT: VU#725188 2. Vulnerable Supported Versions System Package ---------------------------------------------------------------------- UnixWare 7.1.4 uw714mp4 3. Solution The proper solution is to install the relevant package below. 4. UnixWare 7.1.4 This patch should only be installed on UnixWare 7.1.4 systems with Maintenance Pack 4 installed. This package supercedes the BIND 9.4.2-P1 Update. 4.1 Location of Fixed Binaries ftp://ftp.sco.com/pub/unixware7/714/security/p535243_uw7/ 4.2 Verification MD5 (p535243b.image) = a6ebe375d7dedf418f098a4e5d59a5ea md5 is available for download from ftp://ftp.sco.com/pub/security/tools 4.3 Installation Instructions 1. Download the p535243.image file to the /tmp directory on your machine. 2. As root, add the package to your system using these commands: $ su - Password: # pkgadd -d /tmp/p535243.image Alternatively, this package may be installed in quiet mode, that is, without displaying the release notes and asking for confirmation. To do this, use these commands: $ su - Password: # pkgadd -qd /tmp/p535243.image all 3. There is no need to reboot the system after installing this package. However, if your system is running any libraries or commands that are contained in this package, then these programs will continue to run with the old versions of these libraries or commands until the system is rebooted. Note that when all necessary patches have been installed, it is good practice to reboot the system at the earliest opportunity. This will ensure that no programs continue to run with the old libraries or commands. 4.4 Removal Instructions 1. As root, remove the package using these commands: $ su - Password: # pkgrm p534997 2. Reboot the system after removing this package. 5. References SCO security resources: http://www.sco.com/support/download.html SCO security advisories via email http://www.sco.com/support/forums/security.html This security fix closes SCO incidents fz535243. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0097 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4022 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0696 6. Disclaimers SCO is not responsible for the misuse of any of the information we provide on this website and/or through our security advisories. Our advisories are a service to our customers intended to promote secure installation and use of SCO products. 7. Acknowledgments N/A