search menu icon-carat-right cmu-wordmark

CERT Coordination Center

BIND DNS Nameserver, DNSSEC validation Vulnerability

Vulnerability Note VU#418861

Original Release Date: 2009-12-01 | Last Revised: 2010-01-19

Overview

A vulnerability exists in the way BIND 9 handles recursive client queries that may cause additional records to be added to its cache.

Description

BIND 9 contains a vulnerability in the way recursive client queries are handled. According to ISC:

A nameserver with DNSSEC validation enabled may incorrectly add unauthenticated records to its cache that are received during the resolution of a recursive client query with checking disabled (CD), or when the nameserver internally triggers a query for missing records for recursive name resolution. Cached records can be returned in response to subsequent client queries with or without requesting DNSSEC records (DO). In addition, some of them can be returned to queries with or without checking disabled (CD).

This issue affects BIND versions 9.0.x, 9.1.x, 9.2.x, 9.3.x, 9.4.0 -> 9.4.3-P3, 9.5.0, 9.5.1, 9.5.2, 9.6.0, 9.6.1-P1.

Impact

An attacker may be able to manipulate cache data and perform DNS Cache Poisoning.

Solution

Upgrade
BIND should be upgraded to version 9.4.3-P5, 9.5.2-P2 or 9.6.1-P3.

Disable DNSSEC Validation
According to ISC:
Disabling DNSSEC validation will also prevent incorrect caching of additional records due to this defect. However, this removes DNSSEC validation protection and the ability of the nameserver to deliver authenticated data in query responses.

Vendor Information

418861
 

View all 55 vendors View less vendors


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

ISC credits Michael Sinatra, UC Berkeley with finding this issue.

This document was written by Chris Taschner.

Other Information

CVE IDs: CVE-2009-4022
Date Public: 2009-11-19
Date First Published: 2009-12-01
Date Last Updated: 2010-01-19 19:08 UTC
Document Revision: 17

Sponsored by CISA.