First published: Tue Oct 13 2009(Updated: )
Unbound before 1.3.4 does not properly verify signatures for NSEC3 records, which allows remote attackers to cause secure delegations to be downgraded via DNS spoofing or other DNS-related attacks in conjunction with crafted delegation responses.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
libunbound | =0.8 | |
libunbound | =1.2.1 | |
libunbound | =1.0.1 | |
libunbound | =1.1.0 | |
libunbound | =0.0 | |
libunbound | =0.10 | |
libunbound | =1.3.0 | |
libunbound | =0.09 | |
libunbound | =1.0.0 | |
libunbound | =0.7.2 | |
libunbound | =1.1.1 | |
libunbound | =0.11 | |
libunbound | <=1.3.3 | |
libunbound | =1.3.2 | |
libunbound | =1.3.1 | |
libunbound | =0.4 | |
libunbound | =0.7 | |
libunbound | =0.2 | |
libunbound | =0.1 | |
libunbound | =0.7.1 | |
libunbound | =1.2.0 | |
libunbound | =1.0.2 | |
libunbound | =0.5 | |
libunbound | =0.6 | |
libunbound | =0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-3602 has a high severity rating due to its potential to enable DNS spoofing attacks.
To fix CVE-2009-3602, upgrade the Unbound software to version 1.3.4 or later.
CVE-2009-3602 may allow remote attackers to downgrade secure DNS delegations, compromising the integrity of DNS responses.
CVE-2009-3602 affects Unbound versions prior to 1.3.4, including several earlier releases.
If unable to update, consider implementing additional DNS security measures, but upgrading to the patched version is recommended.