---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Full Featured Secunia Network Software Inspector (NSI) is now available: http://secunia.com/network_software_inspector/ The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,000 different Windows applications. ---------------------------------------------------------------------- TITLE: Mandriva update for bind SECUNIA ADVISORY ID: SA26227 VERIFY ADVISORY: http://secunia.com/advisories/26227/ CRITICAL: Moderately critical IMPACT: Spoofing WHERE: >From remote OPERATING SYSTEM: Mandriva Linux 2007 http://secunia.com/product/12165/ DESCRIPTION: Mandriva has issued an update for bind. This fixes a vulnerability, which can be exploited by malicious people to poison the DNS cache. For more information: SA26152 SOLUTION: Apply updated packages. -- Mandriva Linux 2007 -- 2ebbd9a8148b7b4f05d255724627e348 2007.0/i586/bind-9.3.2-8.3mdv2007.0.i586.rpm 386aa2bab5b3e23cb0c6f19bc17b0cd5 2007.0/i586/bind-devel-9.3.2-8.3mdv2007.0.i586.rpm d8e4b592f2d0fa630e32c23c50ab2565 2007.0/i586/bind-utils-9.3.2-8.3mdv2007.0.i586.rpm 557c41948b1ff0e4f329e2592c0dcb9f 2007.0/SRPMS/bind-9.3.2-8.3mdv2007.0.src.rpm -- Mandriva Linux 2007/X86_64 -- 7fe09bf456f8a4d83ee7e4caad08b791 2007.0/x86_64/bind-9.3.2-8.3mdv2007.0.x86_64.rpm e5d4a371c47e6a6f6567c454766ea734 2007.0/x86_64/bind-devel-9.3.2-8.3mdv2007.0.x86_64.rpm 5a41c963b1e5fab7515856f14ec4c3c4 2007.0/x86_64/bind-utils-9.3.2-8.3mdv2007.0.x86_64.rpm 557c41948b1ff0e4f329e2592c0dcb9f 2007.0/SRPMS/bind-9.3.2-8.3mdv2007.0.src.rpm -- Mandriva Linux 2007.1 -- c5edcec0bc385a1a2c717963b0f15dc0 2007.1/i586/bind-9.4.1-0.2mdv2007.1.i586.rpm 9c579fed148a85a852b73828613cafde 2007.1/i586/bind-devel-9.4.1-0.2mdv2007.1.i586.rpm 9a761cb0c7128b83522934b2d9cc2dfc 2007.1/i586/bind-utils-9.4.1-0.2mdv2007.1.i586.rpm af14ae7948a33b1bf21d9bcafbf0e98e 2007.1/SRPMS/bind-9.4.1-0.2mdv2007.1.src.rpm -- Mandriva Linux 2007.1/X86_64 -- 7a612949e7810f83e1322a574be9500c 2007.1/x86_64/bind-9.4.1-0.2mdv2007.1.x86_64.rpm ece5e802b3d5928999c34b1f9c95dfc8 2007.1/x86_64/bind-devel-9.4.1-0.2mdv2007.1.x86_64.rpm b3ccec62bfc5d07b9858f04ce8de8fd1 2007.1/x86_64/bind-utils-9.4.1-0.2mdv2007.1.x86_64.rpm af14ae7948a33b1bf21d9bcafbf0e98e 2007.1/SRPMS/bind-9.4.1-0.2mdv2007.1.src.rpm ORIGINAL ADVISORY: http://www.mandriva.com/security/advisories?name=MDKSA-2007:149 OTHER REFERENCES: SA26152: http://secunia.com/advisories/26152/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------