Rapid7 Vulnerability & Exploit Database

RHSA-2010:0062: bind security update

Back to Search

RHSA-2010:0062: bind security update

Severity
8
CVSS
(AV:N/AC:H/Au:N/C:C/I:C/A:C)
Published
01/22/2010
Created
07/25/2018
Added
01/27/2010
Modified
07/04/2017

Description

The Berkeley Internet Name Domain (BIND) is an implementation of the DomainName System (DNS) protocols. BIND includes a DNS server (named); a resolverlibrary (routines for applications to use when interfacing with DNS); andtools for verifying that the DNS server is operating correctly.A flaw was found in the BIND DNSSEC NSEC/NSEC3 validation code. If BIND wasrunning as a DNSSEC-validating resolver, it could incorrectly cacheNXDOMAIN responses, as if they were valid, for records proven by NSEC orNSEC3 to exist. A remote attacker could use this flaw to cause a BINDserver to return the bogus, cached NXDOMAIN responses for valid records andprevent users from retrieving those records (denial of service).(CVE-2010-0097)The original fix for CVE-2009-4022 was found to be incomplete. BIND wasincorrectly caching certain responses without performing proper DNSSECvalidation. CNAME and DNAME records could be cached, without proper DNSSECvalidation, when received from processing recursive client queries thatrequested DNSSEC records but indicated that checking should be disabled. Aremote attacker could use this flaw to bypass the DNSSEC validation checkand perform a cache poisoning attack if the target BIND server wasreceiving such client queries. (CVE-2010-0290)All BIND users are advised to upgrade to these updated packages, whichcontain a backported patch to resolve these issues. After installing theupdate, the BIND daemon (named) will be restarted automatically.

Solution(s)

  • redhat-upgrade-bind
  • redhat-upgrade-bind-chroot
  • redhat-upgrade-bind-devel
  • redhat-upgrade-bind-libbind-devel
  • redhat-upgrade-bind-libs
  • redhat-upgrade-bind-sdb
  • redhat-upgrade-bind-utils
  • redhat-upgrade-caching-nameserver

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;