Lucene search

K
f5F5F5:K10898
HistoryJul 03, 2013 - 12:00 a.m.

K10898 : DNSSEC BIND vulnerability - CVE-2009-4022

2013-07-0300:00:00
my.f5.com
3

6.4 Medium

AI Score

Confidence

Low

2.6 Low

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:N/I:P/A:N

0.013 Low

EPSS

Percentile

84.3%

Security Advisory Description

Note: Versions that are not listed in this article have not been evaluated for vulnerability to this security advisory. For information about the F5 security policy regarding evaluating older and unsupported versions of F5 products, refer to K4602: Overview of F5 security vulnerability response policy.

F5 products and versions that _have been evaluated for _this Security Advisory

Product Affected Not Affected
BIG-IP LTM 10.1.0 9.x
10.0.0 - 10.0.1
10.2.x
11.x
BIG-IP GTM 10.1.0 9.x
10.0.0 - 10.0.1
10.2.x
11.x
BIG-IP ASM 10.1.0 9.x
10.0.0 - 10.0.1
10.2.x
11.x
BIG-IP Link Controller 10.1.0 9.x
10.0.0 - 10.0.1
10.2.x
11.x
BIG-IP WebAccelerator 10.1.0 9.x
10.0.0 - 10.0.1
10.2.x
11.x
BIG-IP PSM 10.1.0 9.x
10.0.0 - 10.0.1
10.2.x
11.x
BIG-IP WAN Optimization 10.1.0 9.x
10.0.0 - 10.0.1
10.2.x
11.x
BIG-IP APM 10.1.0 9.x
10.0.0 - 10.0.1
10.2.x
11.x
BIG-IP Edge Gateway 10.1.0 9.x
10.0.0 - 10.0.1
10.2.x
11.x
BIG-IP Analytics None 11.x
BIG-IP AFM None 11.x
BIG-IP PEM
None 11.x
BIG-IP AAM None 11.x
FirePass None 5.x
6.x
7.x
Enterprise Manager None 1.x
2.x
3.x
ARX None 2.x
3.x
4.x
5.x
6.x

Vulnerability description and product information:

Unspecified vulnerability in ISC BIND 9.4 before 9.4.3-P4, 9.5 before 9.5.2-P1, 9.6 before 9.6.1-P2, 9.7 beta before 9.7.0b3, and 9.0.x through 9.3.x with DNSSEC validation enabled and checking disabled (CD), allows remote attackers to conduct DNS cache poisoning attacks via additional sections in a response sent for resolution of a recursive client query, which is not properly handled when the response is processed β€œat the same time as requesting DNSSEC records (DO).”

Information about this advisory is available at the following location:

<https://vulners.com/cve/CVE-2009-4022&gt;

F5 Product Development is tracked this issue as CR133100 and it was fixed in BIG-IP 10.2.0. For information about upgrading, refer to the BIG-IP LTM, ASM, GTM, PSM, Link Controller, WebAccelerator, APM, WOM, or Edge Gateway release notes.

6.4 Medium

AI Score

Confidence

Low

2.6 Low

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:N/I:P/A:N

0.013 Low

EPSS

Percentile

84.3%