Scientific Linux Security Update : bind on SL5.x i386/x86_64

low Nessus Plugin ID 60697

Synopsis

The remote Scientific Linux host is missing one or more security updates.

Description

CVE-2009-4022 bind: cache poisoning using not validated DNSSEC responses

Michael Sinatra discovered that BIND was incorrectly caching responses without performing proper DNSSEC validation, when those responses were received during the resolution of a recursive client query that requested DNSSEC records but indicated that checking should be disabled. A remote attacker could use this flaw to bypass the DNSSEC validation check and perform a cache poisoning attack if the target BIND server was receiving such client queries. (CVE-2009-4022)

After installing the update, the BIND daemon (named) will be restarted automatically.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?90462898

Plugin Details

Severity: Low

ID: 60697

File Name: sl_20091130_bind_on_SL5_x.nasl

Version: 1.6

Type: local

Agent: unix

Published: 8/1/2012

Updated: 1/14/2021

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: Low

Base Score: 2.6

Vector: CVSS2#AV:N/AC:H/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 11/30/2009

Reference Information

CVE: CVE-2009-4022