Jump to content

Advisories MDVSA-2010:021: bind


paul
 Share

Recommended Posts

Some vulnerabilities were discovered and corrected in bind:

 

The original fix for CVE-2009-4022 was found to be incomplete. BIND

was incorrectly caching certain responses without performing proper

DNSSEC validation. CNAME and DNAME records could be cached, without

proper DNSSEC validation, when received from processing recursive

client queries that requested DNSSEC records but indicated that

checking should be disabled. A remote attacker could use this flaw

to bypass the DNSSEC validation check and perform a cache poisoning

attack if the target BIND server was receiving such client queries

(CVE-2010-0290).

 

There was an error in the DNSSEC NSEC/NSEC3 validation code that

could cause bogus NXDOMAIN responses (that is, NXDOMAIN responses

for records proven by NSEC or NSEC3 to exist) to be cached as if they

had validated correctly, so that future queries to the resolver would

return the bogus NXDOMAIN with the AD flag set (CVE-2010-0097).

 

Packages for 2008.0 are provided for Corporate Desktop 2008.0

customers.

 

Additionally BIND has been upgraded to the latest patch release

version.

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
 Share

×
×
  • Create New...