ISC BIND DNSSEC Remote Cache Poisoning Vulnerabilities

2010.01.27
Credit: Josh Bressers
Risk: High
Local: No
Remote: Yes


CVSS Base Score: 4/10
Impact Subscore: 4.9/10
Exploitability Subscore: 4.9/10
Exploit range: Remote
Attack complexity: High
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: Partial

I'm not assigning this one as I'm not sure if you've seen this or not. ISC released an update today for BIND, part of it was that CVE-2009-4022 was not completely fixed: https://www.isc.org/advisories/CVE-2009-4022 If you look down at the bottom of their advisory you can see this: Jan. 19 - Revised Summary, Severity, Description, Workaround, Impact & Solution (earlier fixes incomplete) As best as we can tell, this is why: https://bugzilla.redhat.com/show_bug.cgi?id=554851#c7 Thanks.

References:

https://www.isc.org/advisories/CVE-2009-4022v6
https://rhn.redhat.com/errata/RHSA-2010-0062.html
https://bugzilla.redhat.com/show_bug.cgi?id=557121
https://bugzilla.redhat.com/show_bug.cgi?id=554851
http://www.vupen.com/english/advisories/2010/0176
http://www.ubuntu.com/usn/USN-888-1
http://www.mandriva.com/security/advisories?name=MDVSA-2010:021
http://secunia.com/advisories/38240
http://secunia.com/advisories/38219
http://marc.info/?l=oss-security&m=126399602810086&w=2
http://marc.info/?l=oss-security&m=126393609503704&w=2


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2022, cxsecurity.com

 

Back to Top