[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249966

 
 

909

 
 

195636

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

CESA-2009:1620 -- centos 5 i386 bind

ID: oval:org.secpod.oval:def:202019Date: (C)2012-01-31   (M)2024-01-29
Class: PATCHFamily: unix




The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Michael Sinatra discovered that BIND was incorrectly caching responses without performing proper DNSSEC validation, when those responses were received during the resolution of a recursive client query that requested DNSSEC records but indicated that checking should be disabled. A remote attacker could use this flaw to bypass the DNSSEC validation check and perform a cache poisoning attack if the target BIND server was receiving such client queries. All BIND users are advised to upgrade to these updated packages, which contain a backported patch to resolve this issue. After installing the update, the BIND daemon will be restarted automatically.

Platform:
CentOS 5
Product:
bind
Reference:
CESA-2009:1620
CVE-2009-4022
CVE    1
CVE-2009-4022
CPE    146
cpe:/a:isc:bind:9.2.4:rc2
cpe:/a:isc:bind:9.2.4:rc3
cpe:/a:isc:bind:9.3.1:rc1
cpe:/a:isc:bind:9.2.4:rc4
...

© SecPod Technologies