8 High
AI Score
Confidence
High
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
0.013 Low
EPSS
Percentile
85.5%
It was discovered that Bind would incorrectly cache bogus NXDOMAIN
responses. When DNSSEC validation is in use, a remote attacker could
exploit this to cause a denial of service, and possibly poison DNS caches.
(CVE-2010-0097)
USN-865-1 provided updated Bind packages to fix a security vulnerability.
The upstream security patch to fix CVE-2009-4022 was incomplete and
CVE-2010-0290 was assigned to the issue. This update corrects the problem.
Original advisory details:
Michael Sinatra discovered that Bind did not correctly validate certain
records added to its cache. When DNSSEC validation is in use, a remote
attacker could exploit this to spoof DNS entries and poison DNS caches.
Among other things, this could lead to misdirected email and web traffic.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 9.10 | noarch | libdns53 | < 1:9.6.1.dfsg.P1-3ubuntu0.3 | UNKNOWN |
Ubuntu | 9.10 | noarch | bind9 | < 1:9.6.1.dfsg.P1-3ubuntu0.3 | UNKNOWN |
Ubuntu | 9.10 | noarch | bind9-host | < 1:9.6.1.dfsg.P1-3ubuntu0.3 | UNKNOWN |
Ubuntu | 9.10 | noarch | bind9utils | < 1:9.6.1.dfsg.P1-3ubuntu0.3 | UNKNOWN |
Ubuntu | 9.10 | noarch | dnsutils | < 1:9.6.1.dfsg.P1-3ubuntu0.3 | UNKNOWN |
Ubuntu | 9.10 | noarch | libbind-dev | < 1:9.6.1.dfsg.P1-3ubuntu0.3 | UNKNOWN |
Ubuntu | 9.10 | noarch | libbind9-50 | < 1:9.6.1.dfsg.P1-3ubuntu0.3 | UNKNOWN |
Ubuntu | 9.10 | noarch | libdns50 | < 1:9.6.1.dfsg.P1-3ubuntu0.3 | UNKNOWN |
Ubuntu | 9.10 | noarch | libisc50 | < 1:9.6.1.dfsg.P1-3ubuntu0.3 | UNKNOWN |
Ubuntu | 9.10 | noarch | libisccc50 | < 1:9.6.1.dfsg.P1-3ubuntu0.3 | UNKNOWN |