Rapid7 Vulnerability & Exploit Database

USN-865-1: Bind vulnerability

Back to Search

USN-865-1: Bind vulnerability

Severity
3
CVSS
(AV:N/AC:H/Au:N/C:N/I:P/A:N)
Published
11/25/2009
Created
07/25/2018
Added
05/06/2013
Modified
07/09/2020

Description

Unspecified vulnerability in ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P4, 9.5 before 9.5.2-P1, 9.6 before 9.6.1-P2, and 9.7 beta before 9.7.0b3, with DNSSEC validation enabled and checking disabled (CD), allows remote attackers to conduct DNS cache poisoning attacks by receiving a recursive client query and sending a response that contains an Additional section with crafted data, which is not properly handled when the response is processed "at the same time as requesting DNSSEC records (DO)," aka Bug 20438.

Solution(s)

  • ubuntu-upgrade-libdns36
  • ubuntu-upgrade-libdns44
  • ubuntu-upgrade-libdns46
  • ubuntu-upgrade-libdns53

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;