Micetro by Men&Mice
Latest versions
Search all documentation
Men&Mice is releasing versions 9.3.6 and 9.2.11 for the Men&Mice Virtual DNS/DHCP appliances to patch three vulnerabilities found in BIND:
CVE-2020-8622: A truncated TSIG response can lead to an assertion failure
CVE-2020-8623: A flaw in native PKCS#11 code can lead to a remotely triggerable assertion failure in pk11.c
CVE-2020-8624: "update-policy" rules of type "subdomain" were enforced incorrectly
The new releases now run BIND 9.11.22, which contains patches from ISC to close these vulnerabilities.
Men&Mice customers are highly encouraged to update their software, easily done using the Automatic Updates feature of the Men&Mice Suite.
For details on how to update the Men&Mice Suite, see:
https://docs.menandmice.com/display/MM/Updating+the+Men+and+Mice+Suite
For more information regarding the upgrade, contact Men&Mice Support using the link below:
https://docs.menandmice.com/display/MM/Contacting+Support
Due to vulnerabilities found in BIND and Unbound, 3rd-party softwares running on the Men&Mice Virtual DNS/DHCP appliances, Men&Mice has released a security update for the Men&Mice Suite.
Developers of BIND and Unbound have issued updates to fix these issues, and Men&Mice has updated the DNS/DHCP appliances to include these patches. Versions 9.2.10 and 9.3.5 contain the fixes.
Men&Mice customers are highly encouraged to update their software, easily done using the Automatic Updates feature of the Men & Mice Suite.
For details on how to update the Men & Mice Suite, see:
https://docs.menandmice.com/display/MM/Updating+the+Men+and+Mice+Suite
For more information regarding the upgrade, contact Men & Mice Support using the link below:
https://docs.menandmice.com/display/MM/Contacting+Support
Two vulnerabilities were found in BIND, a 3rd-party software running on the Men&Mice Virtual DNS/DHCP appliance.
Neither vulnerability has any known exploits, and ISC (the developer of the BIND software) has issued an update to fix both issues. The BIND component has been updated for the Men&Mice appliances. Customers are highly encouraged to update them (as well as any other installs of BIND in their network) at their earliest convenience.
The appliances can be easily upgraded using the Automatic Updates feature of the Men & Mice Suite.
For details on how to update the Men & Mice Suite, see:
https://docs.menandmice.com/display/MM/Updating+the+Men+and+Mice+Suite
For more information regarding the upgrade, contact Men & Mice Support using the link below:
https://docs.menandmice.com/display/MM/Contacting+Support
A vulnerability, CVE-2019-6477: TCP-pipelined queries can bypass tcp-clients limit, was found in 3rd party software running on the Men & Mice appliances.
A client using a TCP-pipelined connection to a server could consume more resources than the server has been provisioned to handle. When a TCP
connection with a large number of pipelined queries is closed, the load on the server releasing these multiple resources can cause it to become unresponsive, even for queries that can be answered
authoritatively or from cache
We recommend that all Men & Mice Appliances are upgraded to the latest version, 9.2.6.
The appliances can be easily upgraded using the Automatic Updates feature of the Men & Mice Suite.
For details on how to update the Men & Mice Suite, see
https://docs.menandmice.com/display/MM/Updating+the+Men+and+Mice+Suite
For more information regarding the upgrade, contact Men & Mice Support using the link below
https://docs.menandmice.com/display/MM/Contacting+Support
Multiple vulnerabilities were found in 3rd party software running on the Men & Mice appliances.
We recommend that all Men & Mice Appliances are upgraded to the latest version, 9.2.4.
The appliances can be easily upgraded using the Automatic Updates feature of the Men & Mice Suite.
For details on how to update the Men & Mice Suite, see
https://docs.menandmice.com/display/MM/Updating+the+Men+and+Mice+Suite
For more information regarding the upgrade, contact Men & Mice Support using the link below
https://docs.menandmice.com/display/MM/Contacting+Support
A vulnerability, CVE-2018-5743 was found in 3rd party software running on our DNS/DHCP appliance.
A defect in BIND's handling the number of TCP clients could allow an attacker to grow the number of simultaneous connections beyond the limit, which would result in unexpected and unreliable behavior.
For more information, see https://kb.isc.org/docs/cve-2018-5743.
We recommend that all Men & Mice DNS/DHCP Appliances are upgraded to the latest version, either 9.1.11 or 9.2.2.
The appliances can be easily upgraded using the Automatic Updates feature of the Men & Mice Suite.
For details on how to update the Men & Mice Suite, see
https://docs.menandmice.com/display/MM/Updating+the+Men+and+Mice+Suite
For more information regarding the upgrade, contact Men & Mice Support using the link below
https://docs.menandmice.com/display/MM/Contacting+Support
This is an critical operational announcement from Men & Mice.
An issue was found in 3rd party software running on our Caching appliances. A critical issue was found in an internal tool that is used to update trust anchors for the
Unbound DNS server. Consequently, the DNS server on the Caching Appliance was upgraded to version 1.6.5.
A KSK key rollover is scheduled for the root zone on the 11th of October 2018 and before, Unbound must be able to update the trust anchors automatically. That has been fixed in version 1.6.5 of Unbound and in version 9.1.4 of the Men & Mice Suite.
We recommend that all Men & Mice Appliances are upgraded to the latest version, which is 9.1.4.
The appliances on the 8.3 and 8.1 versions will be available on the 26th of September 2018.
The appliances can be easily upgraded using the Automatic Updates feature of the Men & Mice Suite.
For details on how to update the Men & Mice Suite, see
https://docs.menandmice.com/display/MM/Updating+the+Men+and+Mice+Suite
For more information regarding the upgrade, contact Men & Mice Support using the link below
https://docs.menandmice.com/display/MM/Contacting+Support
The following vulnerabilities were found in 3rd party software running on our DNS/DHCP appliance:
CVE-2017-3142: An error in TSIG authentication can permit unauthorized zone transfers. See for https://kb.isc.org/article/AA-01504 more details.
CVE-2017-3143: An error in TSIG authentication can permit unauthorized dynamic updates. See for https://kb.isc.org/article/AA-01503 more details.
We recommend that all Men & Mice DNS/DHCP Appliances are upgraded to one of the following versions:
The appliances can be easily upgraded using the Automatic Updates feature of the Men & Mice Suite.
For details on how to update the Men & Mice Suite, see
https://docs.menandmice.com/display/MM/Updating+the+Men+and+Mice+Suite
For more information regarding the upgrade, contact Men & Mice Support using the link below
https://docs.menandmice.com/display/MM/Contacting+Support
Multiple vulnerabilities were found in 3rd party software running on our DNS/DHCP appliance:
CVE-2017-3136: An error handling synthesized records could cause an assertion failure when using DNS64 with "break-dnssec yes;". See for https://kb.isc.org/article/AA-01465 more details.
CVE-2017-3137: A response packet can cause a resolver to terminate when processing an answer containing a CNAME or DNAME. See https://kb.isc.org/article/AA-01466 for more details.
CVE-2017-3138: named exits with a REQUIRE assertion failure if it receives a null command string on its control channel. See https://kb.isc.org/article/AA-01471 for more details.
We recommend that all Men & Mice DNS/DHCP Appliances are upgraded to either 7.1.13 or 8.1.2. Both versions are LTS versions.
The appliances can be easily upgraded using the Automatic Updates feature of the Men & Mice Suite.
For details on how to update the Men & Mice Suite, see
https://docs.menandmice.com/display/MM/Updating+the+Men+and+Mice+Suite
For more information regarding the upgrade, contact Men & Mice Support using the link below
https://docs.menandmice.com/display/MM/Contacting+Support
Multiple vulnerabilities were found in 3rd party software running on our DNS/DHCP appliance:
We recommend that all Men & Mice DNS/DHCP Appliances are upgraded to the latest version, which is 7.3.2.
The appliances on the 7.1 LTS version have also been updated. The latest version in 7.1 is 7.1.12
The appliances can be easily upgraded using the Automatic Updates feature of the Men & Mice Suite.
For details on how to update the Men & Mice Suite, see
https://docs.menandmice.com/display/MM/Updating+the+Men+and+Mice+Suite
For more information regarding the upgrade, contact Men & Mice Support using the link below
https://docs.menandmice.com/display/MM/Contacting+Support
A vulnerability, CVE-2016-8864 was found in 3rd party software running on our DNS/DHCP appliance.
A defect in BIND's handling of responses containing a DNAME answer can cause a resolver to exit
after encountering an assertion failure in db.c or resolver.c
For more information, see https://kb.isc.org/article/AA-01434.
We recommend that all Men & Mice DNS/DHCP Appliances are upgraded to the latest version, which is 7.2.7.
The appliances on the 7.1 version have also been updated. The latest version in 7.1 is 7.1.11
The appliances can be easily upgraded using the Automatic Updates feature of the Men & Mice Suite.
For details on how to update the Men & Mice Suite, see
https://docs.menandmice.com/display/MM/Updating+the+Men+and+Mice+Suite
For more information regarding the upgrade, contact Men & Mice Support using the link below
https://docs.menandmice.com/display/MM/Contacting+Support
A vulnerability, CVE-2016-2776 was found in 3rd party software running on our DNS/DHCP appliance.
A defect in BIND can cause the named process to exit with an assertion failure when constructing a response to a specific query.
For more information, see https://kb.isc.org/article/AA-01419.
We recommend that all Men & Mice DNS/DHCP Appliances are upgraded to the latest version, which is 7.2.4.
The appliances on the 7.1 version have also been updated. The latest version in 7.1 is 7.1.9
The appliances can be easily upgraded using the Automatic Updates feature of the Men & Mice Suite.
For details on how to update the Men & Mice Suite, see
https://docs.menandmice.com/display/MM/Updating+the+Men+and+Mice+Suite
For more information regarding the upgrade, contact Men & Mice Support using the link below
https://docs.menandmice.com/display/MM/Contacting+Support
Two vulnerabilities, CVE-2016-1285 and CVE-2016-1286, were found in 3rd party software running on our DNS/DHCP appliances.
For more information, see https://kb.isc.org/article/AA-01352 and https://kb.isc.org/article/AA-01353. These vulnerabilities
have been fixed in the latest version of the Men & Mice Suite.
Additionally, a vulnerability, CVE-2016-2774, was found in the ISC DHCP server software running on the DNS/DHCP appliance.
By exploiting this vulnerability, an attacker could interfere with the DHCP server operation. A patch is expected later in
March, but until then a workaround is that server operators should restrict the hosts allowed to make connections to
DHCP server inter-process communication channels to trusted hosts, blocking connections to the OMAPI control port and the
failover communications ports from all other hosts.
For more information, see https://kb.isc.org/article/AA-01354
We recommend that all Men & Mice Appliances are upgraded to the latest version, which is 7.1.4.
The appliances on the 6.8 version have also been updated. The latest version in 6.8 is 6.8.11.
The appliances can be easily upgraded using the Automatic Update feature of the Men & Mice Suite.
For details on how to update the Men & Mice Suite, see
https://docs.menandmice.com/display/MM/Updating+the+Men+and+Mice+Suite
For more information regarding the upgrade, contact Men & Mice Support using the link below
https://docs.menandmice.com/display/MM/Contacting+Support
See the Security Announcements Archive for details on previous security announcements
https://docs.menandmice.com/display/MM/Security+Announcements
A vulnerability was found in 3rd party software running on our DNS/DHCP and Caching appliances.
A critical bug was found in the glibc linux library. A remote attacker could crash or, potentially, execute code running the library on Linux.
There are no workarounds other than upgrading the appliance.
We recommend that all Men & Mice Appliances are upgraded to the latest version, which is 7.1.3.
The appliances on the 6.8 version have also been updated. The latest version in 6.8 is 6.8.10.
The appliances can be easily upgraded using the Automatic Update feature of the Men & Mice Suite.
For details on how to update the Men & Mice Suite, see
https://docs.menandmice.com/display/MM/Updating+the+Men+and+Mice+Suite
For more information regarding the upgrade, contact Men & Mice Support using the link below
https://docs.menandmice.com/display/MM/Contacting+Support
See the Security Announcements Archive for details on previous security announcements
https://docs.menandmice.com/display/MM/Security+Announcements
A vulnerability was found in 3rd party software running on our DNS/DHCP appliance.
BIND, the DNS server running on the DNS/DHCP appliance has been found to be vulnerable
where it can crash under certain conditions. This vulnerability has been registered as CVE-2015-1349.
When configured to perform DNSSEC validation, the DNS server can crash when
encountering a rare set of conditions in the managed trust anchors.
There is no workaround other than upgrading the appliance.
We recommend that all Men & Mice DNS/DHCP Appliances are upgraded to the latest version, which is 6.7.6.
The appliances can be easily upgraded using the Automatic Update feature of the Men & Mice Suite.
For details on how to update the Men & Mice Suite, see
https://docs.menandmice.com/display/MM/Updating+the+Men+and+Mice+Suite
For more information regarding the upgrade, contact Men & Mice Support using the link below
https://docs.menandmice.com/display/MM/Contacting+Support
A vulnerability was found in 3rd party software running on our DNS/DHCP appliance.
Due to the "POODLE" vulnerability, the SSLv3 protocol is now disabled on the Men & Mice appliances
We recommend that all Men & Mice DNS/DHCP Appliances are upgraded to the latest version, which is 6.7.4.
The appliances can be easily upgraded using the Automatic Update feature of the Men & Mice Suite.
For details on how to update the Men & Mice Suite, see
https://docs.menandmice.com/display/MM/Updating+the+Men+and+Mice+Suite
For more information regarding the upgrade, contact Men & Mice Support using the link below
https://docs.menandmice.com/display/MM/Contacting+Support
A vulnerability was found in 3rd party software running on our DNS/DHCP appliance and Caching appliance.
A vulnerability was found and patched in Unbound (CVE-2014-8602). Two vulnerabilities were found and patched in BIND (CVE-2014-8500 and CVE-2014-8680)
We recommend that all Men & Mice DNS/DHCP Appliances and Caching appliances are upgraded to the latest version, which is 6.7.3.
The appliances can be easily upgraded using the Automatic Update feature of the Men & Mice Suite.
For details on how to update the Men & Mice Suite, see
https://docs.menandmice.com/display/MM/Updating+the+Men+and+Mice+Suite
For more information regarding the upgrade, contact Men & Mice Support using the link below
https://docs.menandmice.com/display/MM/Contacting+Support