Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.66761
Category:Mandrake Local Security Checks
Title:Mandriva Security Advisory MDVSA-2010:021 (bind)
Summary:NOSUMMARY
Description:Description:
The remote host is missing an update to bind
announced via advisory MDVSA-2010:021.

Some vulnerabilities were discovered and corrected in bind:

The original fix for CVE-2009-4022 was found to be incomplete. BIND
was incorrectly caching certain responses without performing proper
DNSSEC validation. CNAME and DNAME records could be cached, without
proper DNSSEC validation, when received from processing recursive
client queries that requested DNSSEC records but indicated that
checking should be disabled. A remote attacker could use this flaw
to bypass the DNSSEC validation check and perform a cache poisoning
attack if the target BIND server was receiving such client queries
(CVE-2010-0290).

There was an error in the DNSSEC NSEC/NSEC3 validation code that
could cause bogus NXDOMAIN responses (that is, NXDOMAIN responses
for records proven by NSEC or NSEC3 to exist) to be cached as if they
had validated correctly, so that future queries to the resolver would
return the bogus NXDOMAIN with the AD flag set (CVE-2010-0097).

Packages for 2008.0 are provided for Corporate Desktop 2008.0
customers.

Additionally BIND has been upgraded to the latest patch release
version.

Affected: 2008.0, 2009.0, 2009.1, 2010.0, Corporate 4.0,
Enterprise Server 5.0


Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

http://www.securityspace.com/smysecure/catid.html?in=MDVSA-2010:021

Risk factor : Medium

CVSS Score:
4.3

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2009-4022
1021660
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021660.1-1
1021798
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021798.1-1
37118
http://www.securityfocus.com/bid/37118
37426
http://secunia.com/advisories/37426
37491
http://secunia.com/advisories/37491
38219
http://secunia.com/advisories/38219
38240
http://secunia.com/advisories/38240
38794
http://secunia.com/advisories/38794
38834
http://secunia.com/advisories/38834
39334
http://secunia.com/advisories/39334
40730
http://secunia.com/advisories/40730
60493
http://osvdb.org/60493
ADV-2009-3335
http://www.vupen.com/english/advisories/2009/3335
ADV-2010-0176
http://www.vupen.com/english/advisories/2010/0176
ADV-2010-0528
http://www.vupen.com/english/advisories/2010/0528
ADV-2010-0622
http://www.vupen.com/english/advisories/2010/0622
APPLE-SA-2011-10-12-3
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html
FEDORA-2009-12218
https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01172.html
FEDORA-2009-12233
https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01188.html
IZ68597
http://www.ibm.com/support/docview.wss?uid=isg1IZ68597
IZ71667
http://www.ibm.com/support/docview.wss?uid=isg1IZ71667
IZ71774
http://www.ibm.com/support/docview.wss?uid=isg1IZ71774
MDVSA-2009:304
http://www.mandriva.com/security/advisories?name=MDVSA-2009:304
RHSA-2009:1620
http://www.redhat.com/support/errata/RHSA-2009-1620.html
USN-888-1
http://www.ubuntu.com/usn/USN-888-1
VU#418861
http://www.kb.cert.org/vuls/id/418861
[oss-security] 20091124 CVE request: BIND 9 bug involving DNSSEC and the additional section
http://www.openwall.com/lists/oss-security/2009/11/24/2
[oss-security] 20091124 Re: a new bind issue
http://www.openwall.com/lists/oss-security/2009/11/24/8
[oss-security] 20091124 a new bind issue
http://www.openwall.com/lists/oss-security/2009/11/24/1
[security-announce] 20100303 VMSA-2010-0004 ESX Service Console and vMA third party updates
http://lists.vmware.com/pipermail/security-announce/2010/000082.html
bind-dnssec-cache-poisoning(54416)
https://exchange.xforce.ibmcloud.com/vulnerabilities/54416
ftp://ftp.sco.com/pub/unixware7/714/security/p535243_uw7/p535243b.txt
http://aix.software.ibm.com/aix/efixes/security/bind9_advisory.asc
http://support.apple.com/kb/HT5002
http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018
https://bugzilla.redhat.com/show_bug.cgi?id=538744
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488
https://issues.rpath.com/browse/RPL-3152
https://www.isc.org/advisories/CVE-2009-4022v6
https://www.isc.org/advisories/CVE2009-4022
oval:org.mitre.oval:def:10821
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10821
oval:org.mitre.oval:def:11745
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11745
oval:org.mitre.oval:def:7261
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7261
oval:org.mitre.oval:def:7459
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7459
Common Vulnerability Exposure (CVE) ID: CVE-2010-0290
40086
http://secunia.com/advisories/40086
ADV-2010-1352
http://www.vupen.com/english/advisories/2010/1352
DSA-2054
http://www.debian.org/security/2010/dsa-2054
MDVSA-2010:021
http://www.mandriva.com/security/advisories?name=MDVSA-2010:021
RHSA-2010:0062
https://rhn.redhat.com/errata/RHSA-2010-0062.html
SUSE-SA:2010:008
http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html
[oss-security] 20100119 BIND CVE-2009-4022 fix incomplete
http://marc.info/?l=oss-security&m=126393609503704&w=2
[oss-security] 20100120 Re: BIND CVE-2009-4022 fix incomplete
http://marc.info/?l=oss-security&m=126399602810086&w=2
https://bugzilla.redhat.com/show_bug.cgi?id=554851
https://bugzilla.redhat.com/show_bug.cgi?id=557121
oval:org.mitre.oval:def:6815
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6815
oval:org.mitre.oval:def:7512
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7512
oval:org.mitre.oval:def:8884
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8884
Common Vulnerability Exposure (CVE) ID: CVE-2010-0097
BugTraq ID: 37865
http://www.securityfocus.com/bid/37865
CERT/CC vulnerability note: VU#360341
http://www.kb.cert.org/vuls/id/360341
Debian Security Information: DSA-2054 (Google Search)
http://lists.fedoraproject.org/pipermail/package-announce/2010-January/034196.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-January/034202.html
HPdes Security Advisory: HPSBUX02519
http://marc.info/?l=bugtraq&m=127195582210247&w=2
HPdes Security Advisory: SSRT100004
http://www.osvdb.org/61853
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12205
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7212
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7430
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9357
RedHat Security Advisories: RHSA-2010:0062
RedHat Security Advisories: RHSA-2010:0095
https://rhn.redhat.com/errata/RHSA-2010-0095.html
http://securitytracker.com/id?1023474
http://secunia.com/advisories/38169
http://secunia.com/advisories/39582
SuSE Security Announcement: SUSE-SA:2010:008 (Google Search)
http://www.vupen.com/english/advisories/2010/0981
XForce ISS Database: bind-dnssecnsec-cache-poisoning(55753)
https://exchange.xforce.ibmcloud.com/vulnerabilities/55753
CopyrightCopyright (c) 2010 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.