Improper Input Validation Affecting bind package, versions [,9.4.3)[9.5.0,9.5.2)[9.6.0,9.6.1)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
2.56% (90th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-BIND-2382084
  • published26 Jan 2022
  • disclosed22 Jan 2010
  • creditUnknown

Introduced: 22 Jan 2010

CVE-2010-0290  (opens in a new tab)
CWE-20  (opens in a new tab)

How to fix?

Upgrade bind to version 9.4.3, 9.5.2, 9.6.1 or higher.

Overview

Affected versions of this package are vulnerable to Improper Input Validation. Unspecified vulnerability in ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P5, 9.5 before 9.5.2-P2, 9.6 before 9.6.1-P3, and 9.7.0 beta, with DNSSEC validation enabled and checking disabled (CD), allows remote attackers to conduct DNS cache poisoning attacks by receiving a recursive client query and sending a response that contains (1) CNAME or (2) DNAME records, which do not have the intended validation before caching, aka Bug 20737. NOTE: this vulnerability exists because of an incomplete fix for CVE-2009-4022.

References

CVSS Scores

version 3.1