Vulnerabilities > CVE-2009-0265 - Unchecked Return Value vulnerability in ISC Bind
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
NONE Availability impact
NONE Summary
Internet Systems Consortium (ISC) BIND 9.6.0 and earlier does not properly check the return value from the OpenSSL EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077 and CVE-2009-0025.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Nessus
NASL family Mandriva Local Security Checks NASL id MANDRIVA_MDVSA-2009-037.NASL description Internet Systems Consortium (ISC) BIND 9.6.0 and earlier does not properly check the return value from the OpenSSL EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077 and CVE-2009-0025. In this particular case the DSA_verify function was fixed with MDVSA-2009:002, this update does however address the RSA_verify function (CVE-2009-0265). last seen 2020-06-01 modified 2020-06-02 plugin id 36346 published 2009-04-23 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/36346 title Mandriva Linux Security Advisory : bind (MDVSA-2009:037) NASL family Slackware Local Security Checks NASL id SLACKWARE_SSA_2009-014-02.NASL description New bind packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2, 11.0, 12.0, 12.1, 12.2, and -current to fix a security issue. last seen 2020-06-01 modified 2020-06-02 plugin id 54870 published 2011-05-28 reporter This script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/54870 title Slackware 10.0 / 10.1 / 10.2 / 11.0 / 12.0 / 12.1 / 12.2 / 8.1 / 9.0 / 9.1 / current : bind (SSA:2009-014-02) NASL family F5 Networks Local Security Checks NASL id F5_BIGIP_SOL11503.NASL description The remote BIG-IP device is missing a patch required by a security advisory. last seen 2020-06-01 modified 2020-06-02 plugin id 78125 published 2014-10-10 reporter This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/78125 title F5 Networks BIG-IP : BIND 9 vulnerability (SOL11503) NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-200903-14.NASL description The remote host is affected by the vulnerability described in GLSA-200903-14 (BIND: Incorrect signature verification) BIND does not properly check the return value from the OpenSSL functions to verify DSA (CVE-2009-0025) and RSA (CVE-2009-0265) certificates. Impact : A remote attacker could bypass validation of the certificate chain to spoof DNSSEC-authenticated records. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 35812 published 2009-03-10 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/35812 title GLSA-200903-14 : BIND: Incorrect signature verification NASL family F5 Networks Local Security Checks NASL id F5_BIGIP_SOL9754.NASL description The remote BIG-IP device is missing a patch required by a security advisory. last seen 2020-06-01 modified 2020-06-02 plugin id 78228 published 2014-10-10 reporter This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/78228 title F5 Networks BIG-IP : BIND 9 vulnerability (SOL9754)
Statements
contributor | Joshua Bressers |
lastmodified | 2009-01-26 |
organization | Red Hat |
statement | Not vulnerable. This issue did not affect the versions of BIND as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5. |
References
- http://groups.google.com/group/comp.protocols.dns.bind/browse_thread/thread/49ef622c8329fd33
- http://groups.google.com/group/comp.protocols.dns.bind/browse_thread/thread/49ef622c8329fd33
- http://secunia.com/advisories/33559
- http://secunia.com/advisories/33559
- http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.540362
- http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.540362
- http://www.mandriva.com/security/advisories?name=MDVSA-2009:037
- http://www.mandriva.com/security/advisories?name=MDVSA-2009:037
- http://www.vupen.com/english/advisories/2009/0043
- http://www.vupen.com/english/advisories/2009/0043
- https://www.isc.org/node/373
- https://www.isc.org/node/373