exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

CVE-2010-0290

Status Candidate

Overview

Unspecified vulnerability in ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P5, 9.5 before 9.5.2-P2, 9.6 before 9.6.1-P3, and 9.7.0 beta, with DNSSEC validation enabled and checking disabled (CD), allows remote attackers to conduct DNS cache poisoning attacks by receiving a recursive client query and sending a response that contains (1) CNAME or (2) DNAME records, which do not have the intended validation before caching, aka Bug 20737. NOTE: this vulnerability exists because of an incomplete fix for CVE-2009-4022.

Related Files

HP Security Bulletin HPSBUX02546 SSRT100159
Posted Sep 18, 2010
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - A potential security vulnerability has been identified with HP-UX running BIND. The vulnerability could be exploited remotely to create a Denial of Service (DoS) and permit unauthorized disclosure of information.

tags | advisory, denial of service
systems | hpux
advisories | CVE-2009-4022, CVE-2010-0290, CVE-2010-0382
SHA-256 | bd8b17704deb1ab7649c91532d1c94ef776dd4816a7809ba4ddc9d701b153d10
Debian Linux Security Advisory 2054-2
Posted Jun 16, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2054-2 - This update restores the PID file location for bind to the location before the last security update. Several cache-poisoning vulnerabilities have been discovered in BIND. These vulnerabilities are apply only if DNSSEC validation is enabled and trust anchors have been installed, which is not the default.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2010-0097, CVE-2010-0290, CVE-2010-0382
SHA-256 | 641008a7bc8797a719b9c5b286467557338f36a004d245409d2fafcdeac55ac7
Debian Linux Security Advisory 2054-1
Posted Jun 4, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2054-1 - Several cache-poisoning vulnerabilities have been discovered in BIND. These vulnerabilities are apply only if DNSSEC validation is enabled and trust anchors have been installed, which is not the default.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2010-0097, CVE-2010-0290, CVE-2010-0382
SHA-256 | 3f735c4833aeac702aa70117b4ee33364894fa1b8bd7021809591297abc6b061
Gentoo Linux Security Advisory 201006-11
Posted Jun 3, 2010
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201006-11 - Several cache poisoning vulnerabilities have been found in BIND. Multiple cache poisoning vulnerabilities were discovered in BIND. Versions less than 9.4.3_p5 are affected.

tags | advisory, vulnerability
systems | linux, gentoo
advisories | CVE-2009-4022, CVE-2010-0097, CVE-2010-0290, CVE-2010-0382
SHA-256 | e8507ae0312f6e16b9fc87551331eaa59be119931581a9defa718586c4ca5f8f
Mandriva Linux Security Advisory 2010-021
Posted Jan 21, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-021 - The original fix for was found to be incomplete. BIND was incorrectly caching certain responses without performing proper DNSSEC validation. CNAME and DNAME records could be cached, without proper DNSSEC validation, when received from processing recursive client queries that requested DNSSEC records but indicated that checking should be disabled. A remote attacker could use this flaw to bypass the DNSSEC validation check and perform a cache poisoning attack if the target BIND server was receiving such client queries. There was an error in the DNSSEC NSEC/NSEC3 validation code that could cause bogus NXDOMAIN responses (that is, NXDOMAIN responses for records proven by NSEC or NSEC3 to exist) to be cached as if they had validated correctly, so that future queries to the resolver would return the bogus NXDOMAIN with the AD flag set. Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers. Additionally BIND has been upgraded to the latest patch release version.

tags | advisory, remote
systems | linux, mandriva
advisories | CVE-2009-4022, CVE-2010-0097, CVE-2010-0290
SHA-256 | fde9ce451295f0fdc7dc688f5f0672ee2a2653ca75f5f9708eab123dfd58073c
Ubuntu Security Notice 888-1
Posted Jan 21, 2010
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 888-1 - It was discovered that Bind would incorrectly cache bogus NXDOMAIN responses. When DNSSEC validation is in use, a remote attacker could exploit this to cause a denial of service, and possibly poison DNS caches. USN-865-1 provided updated Bind packages to fix a security vulnerability. The upstream security patch to fix CVE-2009-4022 was incomplete and CVE-2010-0290 was assigned to the issue. This update corrects the problem. Michael Sinatra discovered that Bind did not correctly validate certain records added to its cache. When DNSSEC validation is in use, a remote attacker could exploit this to spoof DNS entries and poison DNS caches. Among other things, this could lead to misdirected email and web traffic.

tags | advisory, remote, web, denial of service, spoof
systems | linux, ubuntu
advisories | CVE-2009-4022, CVE-2010-0097, CVE-2010-0290
SHA-256 | 0cfe920e44dece7a866b45de4a885c3fdd90cec12f9a05bff742df28193d5751
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close