---------------------------------------------------------------------- Did you know that a change in our assessment rating, exploit code availability, or if an updated patch is released by the vendor, is not part of this mailing-list? Click here to learn more: http://secunia.com/advisories/business_solutions/ ---------------------------------------------------------------------- TITLE: SUSE update for bind SECUNIA ADVISORY ID: SA33600 VERIFY ADVISORY: http://secunia.com/advisories/33600/ CRITICAL: Less critical IMPACT: Spoofing WHERE: >From remote OPERATING SYSTEM: openSUSE 10.3 http://secunia.com/advisories/product/16124/ openSUSE 11.0 http://secunia.com/advisories/product/19180/ openSUSE 11.1 http://secunia.com/advisories/product/20823/ SUSE Linux Enterprise Server 9 http://secunia.com/advisories/product/4118/ SUSE Linux Enterprise Server 10 http://secunia.com/advisories/product/12192/ SOFTWARE: Novell Open Enterprise Server 1.x http://secunia.com/advisories/product/4664/ DESCRIPTION: SUSE has issued an update for bind. This fixes a vulnerability, which potentially can be exploited by malicious people to conduct spoofing attacks. For more information: SA33404 SOLUTION: Apply updated packages. x86 Platform: openSUSE 11.1: http://download.opensuse.org/pub/opensuse/debug/update/11.1/rpm/i586/bind-debuginfo-9.5.0P2-17.4.1.i586.rpm http://download.opensuse.org/pub/opensuse/debug/update/11.1/rpm/i586/bind-debugsource-9.5.0P2-17.4.1.i586.rpm http://download.opensuse.org/pub/opensuse/update/11.1/rpm/i586/bind-9.5.0P2-17.4.1.i586.rpm http://download.opensuse.org/pub/opensuse/update/11.1/rpm/i586/bind-chrootenv-9.5.0P2-17.4.1.i586.rpm http://download.opensuse.org/pub/opensuse/update/11.1/rpm/i586/bind-devel-9.5.0P2-17.4.1.i586.rpm http://download.opensuse.org/pub/opensuse/update/11.1/rpm/i586/bind-doc-9.5.0P2-17.4.1.i586.rpm http://download.opensuse.org/pub/opensuse/update/11.1/rpm/i586/bind-libs-9.5.0P2-17.4.1.i586.rpm http://download.opensuse.org/pub/opensuse/update/11.1/rpm/i586/bind-utils-9.5.0P2-17.4.1.i586.rpm openSUSE 11.0: http://download.opensuse.org/pub/opensuse/debug/update/11.0/rpm/i586/bind-debuginfo-9.4.2-39.4.i586.rpm http://download.opensuse.org/pub/opensuse/debug/update/11.0/rpm/i586/bind-debugsource-9.4.2-39.4.i586.rpm http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/bind-9.4.2-39.4.i586.rpm http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/bind-chrootenv-9.4.2-39.4.i586.rpm http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/bind-devel-9.4.2-39.4.i586.rpm http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/bind-doc-9.4.2-39.4.i586.rpm http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/bind-libs-9.4.2-39.4.i586.rpm http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/bind-utils-9.4.2-39.4.i586.rpm openSUSE 10.3: http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/bind-9.4.1.P1-12.7.i586.rpm http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/bind-chrootenv-9.4.1.P1-12.7.i586.rpm http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/bind-devel-9.4.1.P1-12.7.i586.rpm http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/bind-doc-9.4.1.P1-12.7.i586.rpm http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/bind-libs-9.4.1.P1-12.7.i586.rpm http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/bind-utils-9.4.1.P1-12.7.i586.rpm x86-64 Platform: openSUSE 11.1: http://download.opensuse.org/pub/opensuse/update/11.1/rpm/x86_64/bind-libs-32bit-9.5.0P2-17.4.1.x86_64.rpm openSUSE 11.0: http://download.opensuse.org/pub/opensuse/update/11.0/rpm/x86_64/bind-libs-32bit-9.4.2-39.4.x86_64.rpm openSUSE 10.3: http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/bind-libs-32bit-9.4.1.P1-12.7.x86_64.rpm Sources: openSUSE 11.1: http://download.opensuse.org/pub/opensuse/update/11.1/rpm/src/bind-9.5.0P2-17.4.1.src.rpm openSUSE 11.0: http://download.opensuse.org/pub/opensuse/update/11.0/rpm/src/bind-9.4.2-39.4.src.rpm openSUSE 10.3: http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/bind-9.4.1.P1-12.7.src.rpm Our maintenance customers are notified individually. The packages are offered for installation from the maintenance web: Open Enterprise Server http://download.novell.com/index.jsp?search=Search&keywords=3c0305962976100c07f4b568bf3ed2f1 Novell Linux POS 9 http://download.novell.com/index.jsp?search=Search&keywords=3c0305962976100c07f4b568bf3ed2f1 Novell Linux Desktop 9 http://download.novell.com/index.jsp?search=Search&keywords=3c0305962976100c07f4b568bf3ed2f1 SUSE SLES 9 http://download.novell.com/index.jsp?search=Search&keywords=3c0305962976100c07f4b568bf3ed2f1 SUSE Linux Enterprise Server 10 SP2 http://download.novell.com/index.jsp?search=Search&keywords=93598a8dd9d9622b980c3c2d7fdfcc61 SLE SDK 10 SP2 http://download.novell.com/index.jsp?search=Search&keywords=93598a8dd9d9622b980c3c2d7fdfcc61 SUSE Linux Enterprise 10 SP2 DEBUGINFO http://download.novell.com/index.jsp?search=Search&keywords=93598a8dd9d9622b980c3c2d7fdfcc61 SUSE Linux Enterprise Desktop 10 SP2 http://download.novell.com/index.jsp?search=Search&keywords=93598a8dd9d9622b980c3c2d7fdfcc61 ORIGINAL ADVISORY: SUSE-SA:2009:005: http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00007.html OTHER REFERENCES: SA33404: http://secunia.com/advisories/33404/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------