search menu icon-carat-right cmu-wordmark

CERT Coordination Center

ISC BIND named validator vulnerability

Vulnerability Note VU#837744

Original Release Date: 2010-12-01 | Last Revised: 2010-12-01

Overview

ISC BIND named contains a vulnerability where under certain situations it could incorrectly mark zone data as insecure.

Description

According to ISC:

named, acting as a DNSSEC validator, was determining if an NS RRset is insecure based on a value that could mean either that the RRset is actually insecure or that there wasn't a matching key for the RRSIG in the DNSKEY RRset when resuming from validating the DNSKEY RRset.
This can happen when in the middle of a DNSKEY algorithm rollover, when two different algorithms were used to sign a zone but only the new set of keys are in the zone DNSKEY RRset.

Impact

Answers are marked incorrectly as insecure.

Solution

Apply an update

Users who obtain BIND from a third-party vendor, such as their operating system vendor, should see the vendor information portion of this document for a partial list of affected vendors.

This vulnerability is addressed in ISC BIND versions 9.4-ESV-R4, 9.6.2-P3 or 9.6-ESV-R3, and 9.7.2-P3. Users of BIND from the original source distribution should upgrade to one of these versions, as appropriate.

See also https://www.isc.org/software/bind/advisories/cve-2010-3614

Vendor Information

837744
 

Internet Systems Consortium Affected

Updated:  December 01, 2010

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Vendor References


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to Internet Systems Consortium for reporting this vulnerability.

This document was written by Michael Orlando.

Other Information

CVE IDs: CVE-2010-3614
Severity Metric: 7.65
Date Public: 2010-12-01
Date First Published: 2010-12-01
Date Last Updated: 2010-12-01 21:33 UTC
Document Revision: 17

Sponsored by CISA.