First published: Mon Nov 30 2009(Updated: )
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain<br>Name System (DNS) protocols. BIND includes a DNS server (named); a resolver<br>library (routines for applications to use when interfacing with DNS); and<br>tools for verifying that the DNS server is operating correctly.<br>Michael Sinatra discovered that BIND was incorrectly caching responses<br>without performing proper DNSSEC validation, when those responses were<br>received during the resolution of a recursive client query that requested<br>DNSSEC records but indicated that checking should be disabled. A remote<br>attacker could use this flaw to bypass the DNSSEC validation check and<br>perform a cache poisoning attack if the target BIND server was receiving<br>such client queries. (CVE-2009-4022)<br>All BIND users are advised to upgrade to these updated packages, which<br>contain a backported patch to resolve this issue. After installing the<br>update, the BIND daemon (named) will be restarted automatically.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/bind | <9.3.6-4.P1.el5_4.1 | 9.3.6-4.P1.el5_4.1 |
redhat/bind | <9.3.6-4.P1.el5_4.1 | 9.3.6-4.P1.el5_4.1 |
redhat/bind-chroot | <9.3.6-4.P1.el5_4.1 | 9.3.6-4.P1.el5_4.1 |
redhat/bind-devel | <9.3.6-4.P1.el5_4.1 | 9.3.6-4.P1.el5_4.1 |
redhat/bind-devel | <9.3.6-4.P1.el5_4.1 | 9.3.6-4.P1.el5_4.1 |
redhat/bind-libbind-devel | <9.3.6-4.P1.el5_4.1 | 9.3.6-4.P1.el5_4.1 |
redhat/bind-libbind-devel | <9.3.6-4.P1.el5_4.1 | 9.3.6-4.P1.el5_4.1 |
redhat/bind-libs | <9.3.6-4.P1.el5_4.1 | 9.3.6-4.P1.el5_4.1 |
redhat/bind-libs | <9.3.6-4.P1.el5_4.1 | 9.3.6-4.P1.el5_4.1 |
redhat/bind-sdb | <9.3.6-4.P1.el5_4.1 | 9.3.6-4.P1.el5_4.1 |
redhat/bind-utils | <9.3.6-4.P1.el5_4.1 | 9.3.6-4.P1.el5_4.1 |
redhat/caching-nameserver | <9.3.6-4.P1.el5_4.1 | 9.3.6-4.P1.el5_4.1 |
redhat/bind-chroot | <9.3.6-4.P1.el5_4.1 | 9.3.6-4.P1.el5_4.1 |
redhat/bind-sdb | <9.3.6-4.P1.el5_4.1 | 9.3.6-4.P1.el5_4.1 |
redhat/bind-utils | <9.3.6-4.P1.el5_4.1 | 9.3.6-4.P1.el5_4.1 |
redhat/caching-nameserver | <9.3.6-4.P1.el5_4.1 | 9.3.6-4.P1.el5_4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.