First published: Wed Jan 20 2010(Updated: )
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain<br>Name System (DNS) protocols. BIND includes a DNS server (named); a resolver<br>library (routines for applications to use when interfacing with DNS); and<br>tools for verifying that the DNS server is operating correctly.<br>A flaw was found in the BIND DNSSEC NSEC/NSEC3 validation code. If BIND was<br>running as a DNSSEC-validating resolver, it could incorrectly cache<br>NXDOMAIN responses, as if they were valid, for records proven by NSEC or<br>NSEC3 to exist. A remote attacker could use this flaw to cause a BIND<br>server to return the bogus, cached NXDOMAIN responses for valid records and<br>prevent users from retrieving those records (denial of service).<br>(CVE-2010-0097)<br>The original fix for CVE-2009-4022 was found to be incomplete. BIND was<br>incorrectly caching certain responses without performing proper DNSSEC<br>validation. CNAME and DNAME records could be cached, without proper DNSSEC<br>validation, when received from processing recursive client queries that<br>requested DNSSEC records but indicated that checking should be disabled. A<br>remote attacker could use this flaw to bypass the DNSSEC validation check<br>and perform a cache poisoning attack if the target BIND server was<br>receiving such client queries. (CVE-2010-0290)<br>All BIND users are advised to upgrade to these updated packages, which<br>contain a backported patch to resolve these issues. After installing the<br>update, the BIND daemon (named) will be restarted automatically.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/bind | <9.3.6-4.P1.el5_4.2 | 9.3.6-4.P1.el5_4.2 |
redhat/bind | <9.3.6-4.P1.el5_4.2 | 9.3.6-4.P1.el5_4.2 |
redhat/bind-chroot | <9.3.6-4.P1.el5_4.2 | 9.3.6-4.P1.el5_4.2 |
redhat/bind-devel | <9.3.6-4.P1.el5_4.2 | 9.3.6-4.P1.el5_4.2 |
redhat/bind-devel | <9.3.6-4.P1.el5_4.2 | 9.3.6-4.P1.el5_4.2 |
redhat/bind-libbind-devel | <9.3.6-4.P1.el5_4.2 | 9.3.6-4.P1.el5_4.2 |
redhat/bind-libbind-devel | <9.3.6-4.P1.el5_4.2 | 9.3.6-4.P1.el5_4.2 |
redhat/bind-libs | <9.3.6-4.P1.el5_4.2 | 9.3.6-4.P1.el5_4.2 |
redhat/bind-libs | <9.3.6-4.P1.el5_4.2 | 9.3.6-4.P1.el5_4.2 |
redhat/bind-sdb | <9.3.6-4.P1.el5_4.2 | 9.3.6-4.P1.el5_4.2 |
redhat/bind-utils | <9.3.6-4.P1.el5_4.2 | 9.3.6-4.P1.el5_4.2 |
redhat/caching-nameserver | <9.3.6-4.P1.el5_4.2 | 9.3.6-4.P1.el5_4.2 |
redhat/bind-chroot | <9.3.6-4.P1.el5_4.2 | 9.3.6-4.P1.el5_4.2 |
redhat/bind-sdb | <9.3.6-4.P1.el5_4.2 | 9.3.6-4.P1.el5_4.2 |
redhat/bind-utils | <9.3.6-4.P1.el5_4.2 | 9.3.6-4.P1.el5_4.2 |
redhat/caching-nameserver | <9.3.6-4.P1.el5_4.2 | 9.3.6-4.P1.el5_4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.