Published: 07/01/2009 Updated: 11/10/2018
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

BIND 9.6.0, 9.5.1, 9.5.0, 9.4.3, and earlier does not properly check the return value from the OpenSSL DSA_verify function, which allows remote malicious users to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077.

Affected Products

Vendor Product Versions
IscBind9.0, 9.0.0, 9.0.1, 9.1, 9.1.0, 9.1.1, 9.1.2, 9.1.3, 9.2.0, 9.2.1, 9.2.2, 9.2.3, 9.2.4, 9.2.5, 9.2.6, 9.2.7, 9.4, 9.4.0, 9.4.1, 9.4.2, 9.4.3, 9.5.0, 9.5.1, 9.6.0

Vendor Advisories

Synopsis Moderate: bind security update Type/Severity Security Advisory: Moderate Topic Updated Bind packages to correct a security issue are now available for RedHat Enterprise Linux 21, 3, 4, and 5This update has been rated as having moderate security impact by the RedHat Security Response Team ...
It was discovered that Bind did not properly perform signature verification When DNSSEC with DSA signatures are in use, a remote attacker could exploit this to bypass signature validation to spoof DNS entries and poison DNS caches Among other things, this could lead to misdirected email and web traffic ...
Debian Bug report logs - #511936 bind9: CVE-2009-0025 incorrect check for openssl return values Package: bind9; Maintainer for bind9 is Debian DNS Team <team+dns@trackerdebianorg>; Source for bind9 is src:bind9 (PTS, buildd, popcon) Reported by: Nico Golde <nion@debianorg> Date: Thu, 15 Jan 2009 18:48:01 UTC Seve ...
It was discovered that BIND, an implementation of the DNS protocol suite, does not properly check the result of an OpenSSL function which is used to verify DSA cryptographic signatures As a result, incorrect DNS resource records in zones protected by DNSSEC could be accepted as genuine For the stable distribution (etch), this problem has been fix ...