Internet Systems Consortium (ISC) BIND 9.6.0 and earlier does not properly check the return value from the OpenSSL EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077 and CVE-2009-0025.
References
Link | Resource |
---|---|
http://groups.google.com/group/comp.protocols.dns.bind/browse_thread/thread/49ef622c8329fd33 | Mailing List |
http://secunia.com/advisories/33559 | Broken Link Vendor Advisory |
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.540362 | Mailing List Patch |
http://www.mandriva.com/security/advisories?name=MDVSA-2009:037 | Broken Link |
http://www.vupen.com/english/advisories/2009/0043 | Broken Link |
https://www.isc.org/node/373 | Broken Link Vendor Advisory |
http://groups.google.com/group/comp.protocols.dns.bind/browse_thread/thread/49ef622c8329fd33 | Mailing List |
http://secunia.com/advisories/33559 | Broken Link Vendor Advisory |
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.540362 | Mailing List Patch |
http://www.mandriva.com/security/advisories?name=MDVSA-2009:037 | Broken Link |
http://www.vupen.com/english/advisories/2009/0043 | Broken Link |
https://www.isc.org/node/373 | Broken Link Vendor Advisory |
Configurations
History
21 Nov 2024, 00:59
Type | Values Removed | Values Added |
---|---|---|
References | () http://groups.google.com/group/comp.protocols.dns.bind/browse_thread/thread/49ef622c8329fd33 - Mailing List | |
References | () http://secunia.com/advisories/33559 - Broken Link, Vendor Advisory | |
References | () http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.540362 - Mailing List, Patch | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2009:037 - Broken Link | |
References | () http://www.vupen.com/english/advisories/2009/0043 - Broken Link | |
References | () https://www.isc.org/node/373 - Broken Link, Vendor Advisory |
13 Feb 2024, 17:43
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-295 CWE-252 |
|
References | (CONFIRM) https://www.isc.org/node/373 - Broken Link, Vendor Advisory | |
References | (SECUNIA) http://secunia.com/advisories/33559 - Broken Link, Vendor Advisory | |
References | (VUPEN) http://www.vupen.com/english/advisories/2009/0043 - Broken Link | |
References | (MISC) http://groups.google.com/group/comp.protocols.dns.bind/browse_thread/thread/49ef622c8329fd33 - Mailing List | |
References | (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2009:037 - Broken Link | |
References | (SLACKWARE) http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.540362 - Mailing List, Patch | |
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 7.5 |
CPE | cpe:2.3:a:isc:bind:9.3.2:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:9.4.2:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:4.9.5:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:9.2.1:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:8.2.1:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:9.5.0:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:8.2.4:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:9.6.0:rc1:*:*:*:*:*:* cpe:2.3:a:isc:bind:4.9.9:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:8.2.5:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:8.2.2:p2:*:*:*:*:*:* cpe:2.3:a:isc:bind:8.4.5:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:4.9.8:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:8.2.2:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:9.1:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:8.2.6:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:9.2.2:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:9.2:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:8.2:p1:*:*:*:*:*:* cpe:2.3:a:isc:bind:8.3.4:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:8.2.2:p1:*:*:*:*:*:* cpe:2.3:a:isc:bind:9.6.0:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:4.9.7:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:8.1.1:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:9.4.3:rc1:*:*:*:*:*:* cpe:2.3:a:isc:bind:9.5.1:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:8.4.1:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:8.2.3:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:4:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:9.5.0:rc1:*:*:*:*:*:* cpe:2.3:a:isc:bind:9.2.3:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:8.1.2:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:8.1:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:9.3.0:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:9.4:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:8.4:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:8.4.4:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:8.2.2:p4:*:*:*:*:*:* cpe:2.3:a:isc:bind:8.4.7:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:8.2.2:p7:*:*:*:*:*:* cpe:2.3:a:isc:bind:9.2.9:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:9.4.3:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:4.9.3:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:9.3.3:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:8:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:9.2.6:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:8.3.3:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:8.3.6:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:9.3.1:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:9.4.0:rc1:*:*:*:*:*:* cpe:2.3:a:isc:bind:9.2.7:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:9.1.1:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:9.1.3:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:9.0:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:8.3.0:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:9.6.0:p1:*:*:*:*:*:* cpe:2.3:a:isc:bind:8.2.7:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:4.9.4:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:4.9.2:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:9.2.2:p3:*:*:*:*:*:* cpe:2.3:a:isc:bind:4.9.6:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:8.2.2:p6:*:*:*:*:*:* cpe:2.3:a:isc:bind:9.2.4:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:8.3.2:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:9.3:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:4.9.10:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:9.5.1:rc2:*:*:*:*:*:* cpe:2.3:a:isc:bind:8.2.2:p5:*:*:*:*:*:* cpe:2.3:a:isc:bind:9.3.5-p2-w1:windows:*:*:*:*:*:* cpe:2.3:a:isc:bind:8.2.2:p3:*:*:*:*:*:* cpe:2.3:a:isc:bind:9.5.1:rc1:*:*:*:*:*:* cpe:2.3:a:isc:bind:8.3.5:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:9.1.2:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:9.0.1:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:9.6.0:rc2:*:*:*:*:*:* cpe:2.3:a:isc:bind:9.2.0:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:8.2:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:9.4.0:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:4.9.5:p1:*:*:*:*:*:* cpe:2.3:a:isc:bind:8.3.1:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:4.9:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:9.2.5:*:*:*:*:*:*:* |
Information
Published : 2009-01-26 15:30
Updated : 2024-11-21 00:59
NVD link : CVE-2009-0265
Mitre link : CVE-2009-0265
CVE.ORG link : CVE-2009-0265
JSON object : View
Products Affected
isc
- bind