Unspecified vulnerability in ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P4, 9.5 before 9.5.2-P1, 9.6 before 9.6.1-P2, and 9.7 beta before 9.7.0b3, with DNSSEC validation enabled and checking disabled (CD), allows remote attackers to conduct DNS cache poisoning attacks by receiving a recursive client query and sending a response that contains an Additional section with crafted data, which is not properly handled when the response is processed "at the same time as requesting DNSSEC records (DO)," aka Bug 20438.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:08
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://ftp.sco.com/pub/unixware7/714/security/p535243_uw7/p535243b.txt - | |
References | () http://aix.software.ibm.com/aix/efixes/security/bind9_advisory.asc - | |
References | () http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html - | |
References | () http://lists.vmware.com/pipermail/security-announce/2010/000082.html - | |
References | () http://osvdb.org/60493 - | |
References | () http://secunia.com/advisories/37426 - Vendor Advisory | |
References | () http://secunia.com/advisories/37491 - Vendor Advisory | |
References | () http://secunia.com/advisories/38219 - Vendor Advisory | |
References | () http://secunia.com/advisories/38240 - Vendor Advisory | |
References | () http://secunia.com/advisories/38794 - Vendor Advisory | |
References | () http://secunia.com/advisories/38834 - Vendor Advisory | |
References | () http://secunia.com/advisories/39334 - Vendor Advisory | |
References | () http://secunia.com/advisories/40730 - Vendor Advisory | |
References | () http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021660.1-1 - | |
References | () http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021798.1-1 - | |
References | () http://support.apple.com/kb/HT5002 - | |
References | () http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018 - | |
References | () http://www.ibm.com/support/docview.wss?uid=isg1IZ68597 - | |
References | () http://www.ibm.com/support/docview.wss?uid=isg1IZ71667 - | |
References | () http://www.ibm.com/support/docview.wss?uid=isg1IZ71774 - | |
References | () http://www.kb.cert.org/vuls/id/418861 - US Government Resource | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2009:304 - | |
References | () http://www.openwall.com/lists/oss-security/2009/11/24/1 - | |
References | () http://www.openwall.com/lists/oss-security/2009/11/24/2 - | |
References | () http://www.openwall.com/lists/oss-security/2009/11/24/8 - | |
References | () http://www.redhat.com/support/errata/RHSA-2009-1620.html - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/37118 - | |
References | () http://www.ubuntu.com/usn/USN-888-1 - | |
References | () http://www.vupen.com/english/advisories/2009/3335 - Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2010/0176 - Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2010/0528 - Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2010/0622 - Vendor Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=538744 - Patch | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/54416 - | |
References | () https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488 - | |
References | () https://issues.rpath.com/browse/RPL-3152 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10821 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11745 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7261 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7459 - | |
References | () https://www.isc.org/advisories/CVE-2009-4022v6 - Vendor Advisory | |
References | () https://www.isc.org/advisories/CVE2009-4022 - Vendor Advisory | |
References | () https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01172.html - | |
References | () https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01188.html - |
Information
Published : 2009-11-25 16:30
Updated : 2024-11-21 01:08
NVD link : CVE-2009-4022
Mitre link : CVE-2009-4022
CVE.ORG link : CVE-2009-4022
JSON object : View
Products Affected
isc
- bind
CWE