CVE-2009-4022 Detail
Modified
This vulnerability has been modified since it was last analyzed by the NVD. It is awaiting reanalysis which may result in further changes to the information provided.
Current Description
Unspecified vulnerability in ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P4, 9.5 before 9.5.2-P1, 9.6 before 9.6.1-P2, and 9.7 beta before 9.7.0b3, with DNSSEC validation enabled and checking disabled (CD), allows remote attackers to conduct DNS cache poisoning attacks by receiving a recursive client query and sending a response that contains an Additional section with crafted data, which is not properly handled when the response is processed "at the same time as requesting DNSSEC records (DO)," aka Bug 20438.
Source:
MITRE
Description Last Modified:
11/25/2009
View Analysis Description
Analysis Description
Unspecified vulnerability in ISC BIND 9.4 before 9.4.3-P4, 9.5 before 9.5.2-P1, 9.6 before 9.6.1-P2, 9.7 beta before 9.7.0b3, and 9.0.x through 9.3.x with DNSSEC validation enabled and checking disabled (CD), allows remote attackers to conduct DNS cache poisoning attacks via additional sections in a response sent for resolution of a recursive client query, which is not properly handled when the response is processed "at the same time as requesting DNSSEC records (DO)."
Source:
MITRE
Description Last Modified:
11/25/2009
Impact
CVSS v2.0 Severity and Metrics:
Base Score:
2.6 LOW
Vector:
(AV:N/AC:H/Au:N/C:N/I:P/A:N)
(V2 legend)
Impact Subscore:
2.9
Exploitability Subscore:
4.9
Access Vector (AV):
Network
Access Complexity (AC):
High
Authentication (AU):
None
Confidentiality (C):
None
Integrity (I):
Partial
Availability (A):
None
Additional Information:
Allows unauthorized modification
References to Advisories, Solutions, and Tools
By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because
they may have information that would be of interest to you. No inferences should be drawn on account of other sites
being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose.
NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further,
NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about
this page to nvd@nist.gov.
Change History
7 change records found
- show changes
CVE Modified by MITRE -
9/18/2017 9:29:54 PM
| Action |
Type |
Old Value |
New Value |
| Added |
Reference |
|
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10821 [No Types Assigned] |
| Added |
Reference |
|
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11745 [No Types Assigned] |
| Added |
Reference |
|
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7261 [No Types Assigned] |
| Added |
Reference |
|
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7459 [No Types Assigned] |
| Removed |
Reference |
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:7459 [No Types Assigned] |
|
| Removed |
Reference |
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11745 [No Types Assigned] |
|
| Removed |
Reference |
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10821 [No Types Assigned] |
|
| Removed |
Reference |
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:7261 [No Types Assigned] |
|
CVE Modified by MITRE -
8/16/2017 9:31:23 PM
| Action |
Type |
Old Value |
New Value |
| Added |
Reference |
|
https://exchange.xforce.ibmcloud.com/vulnerabilities/54416 [No Types Assigned] |
| Removed |
Reference |
http://xforce.iss.net/xforce/xfdb/54416 [No Types Assigned] |
|
CVE Modified by MITRE -
12/6/2016 9:59:48 PM
| Action |
Type |
Old Value |
New Value |
| Added |
Reference |
|
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488 [No Types Assigned] |
| Removed |
Reference |
http://marc.info/?l=bugtraq&m=145408644227561&w=2 [No Types Assigned] |
|
CVE Modified by Source -
8/19/2016 9:59:08 PM
| Action |
Type |
Old Value |
New Value |
| Added |
Reference |
|
http://marc.info/?l=bugtraq&m=145408644227561&w=2 |
CVE Translated -
4/5/2016 3:45:04 AM
| Action |
Type |
Old Value |
New Value |
| Added |
Translation |
|
Record truncated, showing 500 of 679 characters.
View Entire Change Record
Vulnerabilidad no especificada en ISC BIND 9.0.x hasta la versión 9.3.x, 9.4 en versiones anteriores a 9.4.3-P4, 9.5 en versiones anteriores a 9.5.2-P1, 9.6 en versiones anteriores a 9.6.1-P2 y 9.7 beta en versiones anteriores a 9.7.0b3, con validación DNSSEC habilitada y comprobación deshabilitada (CD), permite a atacantes remotos llevar a cabo ataques de envenenamiento de la caché DNS recibiendo una consulta de cliente recursiva y enviando una respuesta que contiene una sección Additional con |
| Removed |
Translation |
Record truncated, showing 500 of 585 characters.
View Entire Change Record
Vulnerabilidad inespecífica en ISC BIND v9.4 anteriores a v9.4.3-P4, v9.5 anteriores a v9.5.2-P1, v9.6 anteriores a v9.6.1-P2, v9.7 beta anteriores a v9.7.0b3, y desde v9.0.x hasta v9.3.x con la validación DNSSEC activada y la comprobación desactivada (CD), permite a atacantes remotos realizar ataques de envenenamiento de cache DNS a través de secciones adicionales en una respuesta enviada para la resolución de una petición recursiva de cliente, lo que no es adecuadamente gestionado cuando la re |
|
Modified Analysis -
4/4/2016 2:15:11 PM
| Action |
Type |
Old Value |
New Value |
| Changed |
CPE Configuration |
Record truncated, showing 500 of 9230 characters.
View Entire Change Record
Configuration 1
OR
*cpe:2.3:a:isc:bind:9.4.2:*:*:*:*:*:*:*
*cpe:2.3:a:isc:bind:9.4.0a4:*:*:*:*:*:*:*
*cpe:2.3:a:isc:bind:9.4.0a3:*:*:*:*:*:*:*
*cpe:2.3:a:isc:bind:9.4.0a2:*:*:*:*:*:*:*
*cpe:2.3:a:isc:bind:9.4.0a1:*:*:*:*:*:*:*
*cpe:2.3:a:isc:bind:9.4.0:*:*:*:*:*:*:*
*cpe:2.3:a:isc:bind:9.4.0:rc1:*:*:*:*:*:*
*cpe:2.3:a:isc:bind:9.4.1:*:*:*:*:*:*:*
*cpe:2.3:a:isc:bind:9.4.0b3:*:*:*:*:*:*:*
*cpe |
Record truncated, showing 500 of 8682 characters.
View Entire Change Record
Configuration 1
OR
*cpe:2.3:a:isc:bind:9.7.0:rc2:*:*:*:*:*:*
*cpe:2.3:a:isc:bind:9.7.0:rc1:*:*:*:*:*:*
*cpe:2.3:a:isc:bind:9.7.0:p1:*:*:*:*:*:*
*cpe:2.3:a:isc:bind:9.7.0:b3:*:*:*:*:*:*
*cpe:2.3:a:isc:bind:9.7.0:b2:*:*:*:*:*:*
*cpe:2.3:a:isc:bind:9.7.0:b1:*:*:*:*:*:*
*cpe:2.3:a:isc:bind:9.7.0:a3:*:*:*:*:*:*
*cpe:2.3:a:isc:bind:9.7.0:a2:*:*:*:*:*:*
*cpe:2.3:a:isc:bind:9.7.0:a1:*:*:*:*:*:*
*cpe: |
Initial CVE Analysis -
11/25/2009 1:06:00 PM
Quick Info
CVE Dictionary Entry:
CVE-2009-4022
NVD Published Date:
11/25/2009
NVD Last Modified:
09/18/2017
|