Advisory Published

RHSA-2010:0062: Moderate: bind security update

First published: Wed Jan 20 2010(Updated: )

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain<br>Name System (DNS) protocols. BIND includes a DNS server (named); a resolver<br>library (routines for applications to use when interfacing with DNS); and<br>tools for verifying that the DNS server is operating correctly.<br>A flaw was found in the BIND DNSSEC NSEC/NSEC3 validation code. If BIND was<br>running as a DNSSEC-validating resolver, it could incorrectly cache<br>NXDOMAIN responses, as if they were valid, for records proven by NSEC or<br>NSEC3 to exist. A remote attacker could use this flaw to cause a BIND<br>server to return the bogus, cached NXDOMAIN responses for valid records and<br>prevent users from retrieving those records (denial of service).<br>(CVE-2010-0097)<br>The original fix for CVE-2009-4022 was found to be incomplete. BIND was<br>incorrectly caching certain responses without performing proper DNSSEC<br>validation. CNAME and DNAME records could be cached, without proper DNSSEC<br>validation, when received from processing recursive client queries that<br>requested DNSSEC records but indicated that checking should be disabled. A<br>remote attacker could use this flaw to bypass the DNSSEC validation check<br>and perform a cache poisoning attack if the target BIND server was<br>receiving such client queries. (CVE-2010-0290)<br>All BIND users are advised to upgrade to these updated packages, which<br>contain a backported patch to resolve these issues. After installing the<br>update, the BIND daemon (named) will be restarted automatically.

Affected SoftwareAffected VersionHow to fix
redhat/bind<9.3.6-4.P1.el5_4.2
9.3.6-4.P1.el5_4.2
redhat/bind<9.3.6-4.P1.el5_4.2
9.3.6-4.P1.el5_4.2
redhat/bind-chroot<9.3.6-4.P1.el5_4.2
9.3.6-4.P1.el5_4.2
redhat/bind-devel<9.3.6-4.P1.el5_4.2
9.3.6-4.P1.el5_4.2
redhat/bind-devel<9.3.6-4.P1.el5_4.2
9.3.6-4.P1.el5_4.2
redhat/bind-libbind-devel<9.3.6-4.P1.el5_4.2
9.3.6-4.P1.el5_4.2
redhat/bind-libbind-devel<9.3.6-4.P1.el5_4.2
9.3.6-4.P1.el5_4.2
redhat/bind-libs<9.3.6-4.P1.el5_4.2
9.3.6-4.P1.el5_4.2
redhat/bind-libs<9.3.6-4.P1.el5_4.2
9.3.6-4.P1.el5_4.2
redhat/bind-sdb<9.3.6-4.P1.el5_4.2
9.3.6-4.P1.el5_4.2
redhat/bind-utils<9.3.6-4.P1.el5_4.2
9.3.6-4.P1.el5_4.2
redhat/caching-nameserver<9.3.6-4.P1.el5_4.2
9.3.6-4.P1.el5_4.2
redhat/bind-chroot<9.3.6-4.P1.el5_4.2
9.3.6-4.P1.el5_4.2
redhat/bind-sdb<9.3.6-4.P1.el5_4.2
9.3.6-4.P1.el5_4.2
redhat/bind-utils<9.3.6-4.P1.el5_4.2
9.3.6-4.P1.el5_4.2
redhat/caching-nameserver<9.3.6-4.P1.el5_4.2
9.3.6-4.P1.el5_4.2

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203