search menu icon-carat-right cmu-wordmark

CERT Coordination Center

BIND 9 DNSSEC validation code could cause fake NXDOMAIN responses

Vulnerability Note VU#360341

Original Release Date: 2010-01-19 | Last Revised: 2010-01-27

Overview

A vulnerability exists in the BIND 9 DNSSEC validation code that could be used by an attacker to generate fake NXDOMAIN responses.

Description

BIND 9 contains a vulnerability in DNSSEC validation code. According to ISC:

There was an error in the DNSSEC NSEC/NSEC3 validation code that could cause bogus NXDOMAIN responses (that is, NXDOMAIN responses for records proven by NSEC or NSEC3 to exist) to be cached as if they had validated correctly, so that future queries to the resolver would return the bogus NXDOMAIN with the AD flag set.

This issue affects BIND versions 9.0.x, 9.1.x, 9.2.x, 9.3.x, 9.4.0 -> 9.4.3-P4, 9.5.0 -> 9.5.2-P1, 9.6.0 -> 9.6.1-P2

Impact

An attacker may be able to add fake NXDOMAIN records to a resolver's cache.

Solution

Upgrade BIND to version 9.4.3-P5, 9.5.2-P2 or 9.6.1-P3.

Vendor Information

360341
 

View all 53 vendors View less vendors


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This issue was reported by ISC.

This document was written by David Warren.

Other Information

CVE IDs: CVE-2010-0097
Date Public: 2010-01-19
Date First Published: 2010-01-19
Date Last Updated: 2010-01-27 19:37 UTC
Document Revision: 13

Sponsored by CISA.