CVE-2009-0265

Internet Systems Consortium (ISC) BIND 9.6.0 and earlier does not properly check the return value from the OpenSSL EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077 and CVE-2009-0025.
Configurations

Configuration 1 (hide)

cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:59

Type Values Removed Values Added
References () http://groups.google.com/group/comp.protocols.dns.bind/browse_thread/thread/49ef622c8329fd33 - Mailing List () http://groups.google.com/group/comp.protocols.dns.bind/browse_thread/thread/49ef622c8329fd33 - Mailing List
References () http://secunia.com/advisories/33559 - Broken Link, Vendor Advisory () http://secunia.com/advisories/33559 - Broken Link, Vendor Advisory
References () http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.540362 - Mailing List, Patch () http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.540362 - Mailing List, Patch
References () http://www.mandriva.com/security/advisories?name=MDVSA-2009:037 - Broken Link () http://www.mandriva.com/security/advisories?name=MDVSA-2009:037 - Broken Link
References () http://www.vupen.com/english/advisories/2009/0043 - Broken Link () http://www.vupen.com/english/advisories/2009/0043 - Broken Link
References () https://www.isc.org/node/373 - Broken Link, Vendor Advisory () https://www.isc.org/node/373 - Broken Link, Vendor Advisory

13 Feb 2024, 17:43

Type Values Removed Values Added
CWE CWE-287 CWE-295
CWE-252
References (CONFIRM) https://www.isc.org/node/373 - Vendor Advisory (CONFIRM) https://www.isc.org/node/373 - Broken Link, Vendor Advisory
References (SECUNIA) http://secunia.com/advisories/33559 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/33559 - Broken Link, Vendor Advisory
References (VUPEN) http://www.vupen.com/english/advisories/2009/0043 - (VUPEN) http://www.vupen.com/english/advisories/2009/0043 - Broken Link
References (MISC) http://groups.google.com/group/comp.protocols.dns.bind/browse_thread/thread/49ef622c8329fd33 - (MISC) http://groups.google.com/group/comp.protocols.dns.bind/browse_thread/thread/49ef622c8329fd33 - Mailing List
References (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2009:037 - (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2009:037 - Broken Link
References (SLACKWARE) http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.540362 - (SLACKWARE) http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.540362 - Mailing List, Patch
CVSS v2 : 5.0
v3 : unknown
v2 : 5.0
v3 : 7.5
CPE cpe:2.3:a:isc:bind:9.4.1:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.3.2:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.4.2:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:4.9.5:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.1:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8.2.1:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.5.0:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8.2.4:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.6.0:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:4.9.9:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8.2.5:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8.2.2:p2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8.4.5:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:4.9.8:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8.2.2:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.1:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8.2.6:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.2:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8.2:p1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8.3.4:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8.2.2:p1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.6.0:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:4.9.7:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8.1.1:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.4.3:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.5.1:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8.4.1:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8.2.3:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:4:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.5.0:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.3:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8.1.2:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8.1:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.3.0:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.4:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8.4:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8.4.4:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8.2.2:p4:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8.4.7:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8.2.2:p7:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.9:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.4.3:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:4.9.3:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.3.3:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.6:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8.3.3:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8.3.6:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.3.1:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.4.0:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.7:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.1.1:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.1.3:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.0:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8.3.0:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.6.0:p1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8.2.7:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:4.9.4:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:4.9.2:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.2:p3:*:*:*:*:*:*
cpe:2.3:a:isc:bind:4.9.6:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8.2.2:p6:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.4:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8.3.2:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.3:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:4.9.10:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.5.1:rc2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8.2.2:p5:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.3.5-p2-w1:windows:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8.2.2:p3:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.5.1:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8.3.5:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.1.2:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.0.1:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.6.0:rc2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.0:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8.2:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.4.0:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:4.9.5:p1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:8.3.1:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:4.9:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.5:*:*:*:*:*:*:*

Information

Published : 2009-01-26 15:30

Updated : 2024-11-21 00:59


NVD link : CVE-2009-0265

Mitre link : CVE-2009-0265

CVE.ORG link : CVE-2009-0265


JSON object : View

Products Affected

isc

  • bind
CWE
CWE-252

Unchecked Return Value

CWE-295

Improper Certificate Validation