Note: This is an archival copy of Security Sun Alert 201539 as previously published on http://sunsolve.sun.com.|
Latest version of this security advisory is available from http://support.oracle.com as Sun Alert 1001148.1.
Solaris 10 Operating System
Date of Workaround Release
Date of Resolved Release
Remote unprivileged users may cause named(1M) to ultimately return incorrect addresses for Internet hosts thereby redirecting end users to unintended hosts and or services.
This issue is also referenced in the following documents:
This issue can occur in the following releases:
Note: Solaris 8 and Solaris 9 are not impacted by this issue.
Only systems with the BIND named(1M) service enabled are impacted by this issue. To verify if the DNS service instance is enabled under smf(5), use the svcs(1) command as follows:
$ svcs -l svc:/network/dns/server:default | grep enabled enabled true
There are no reliable symptoms that would indicate the described issue has occurred.
There is no workaround. Please see the Resolution section below.
This issue is addressed in the following releases:
Note: The resolution provides BIND 9.3.4-P1 as provided by the custodians of BIND; the Internet Systems Consortium (ISC).
After the patch has been installed, it is recommended that BIND administrators familiarize themselves with the "/usr/share/doc/bind/migration.txt" document.
Further information on BIND 9.3 is available in the BIND 9.3 Advanced Reference Manual (ARM) available on the ISC web site at:
This solution has no attachment