MiracleLinux 3 : bind-9.3.6-4.P1.1.1AXS3 (AXSA:2009-425:4)

medium Nessus Plugin ID 284036

Synopsis

The remote MiracleLinux host is missing a security update.

Description

The remote MiracleLinux 3 host has packages installed that are affected by a vulnerability as referenced in the AXSA:2009-425:4 advisory.

BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols. BIND includes a DNS server (named), which resolves host names to IP addresses; a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating properly.
Security issues fixed with this release:
CVE-2009-4022 Unspecified vulnerability in ISC BIND 9.4 before 9.4.3-P4, 9.5 before 9.5.2-P1, 9.6 before 9.6.1-P2, 9.7 beta before 9.7.0b3, and 9.0.x through 9.3.x with DNSSEC validation enabled and checking disabled (CD), allows remote attackers to conduct DNS cache poisoning attacks via additional sections in a response sent for resolution of a recursive client query, which is not properly handled when the response is processed at the same time as requesting DNSSEC records (DO).
Other fixes:
- fix query-source option
- update patch for dynamic database backends
- backport allow-query-cache option to control access for all non-authoritative data
- add support for dynamically loadable database backends
- named-checkconf now checks ACLs validity
- update sample configuration file to address DNS reflector attacks
- handle named_write_master_zones SELinux boolean and /var/named perms relationship as documented
- handle unknown DLV algorithms well
- remove useless glibc-kernheaders BuildReq
- print nicer error message when configuration file is directory
- named-checkconf handles check-names directive well
- select correct nameservers when dig/host is called with -4 param
- add support for master-only notify type
- own chroot/var/log directory
- don't call bind-chroot-admin automatically during installation/update/remove of bind-chroot package. It broke too many configurations
- rebased to 9.3.6-P1, updated patches
- patches merged
- bind-bsdcompat.patch
- bind-9.2.2-nsl.patch
- bind-9.3-CVE-2008-1447.patch
- bind93-rh458932.patch
- bind-9.3-dbus-race.patch
- bind-9.3-l_server.patch
- bind-9.3-CVE-2008-0122.patch
- bind93-dsa_verify.patch
- bind-9.3.1-dbus_archdep_libdir.patch
- bind-9.3.2-prctl_set_dumpable.patch
- libbind-9.3.1rc1-fix_h_errno.patch

Tenable has extracted the preceding description block directly from the MiracleLinux security advisory.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://tsn.miraclelinux.com/en/node/1063

Plugin Details

Severity: Medium

ID: 284036

File Name: miracle_linux_AXSA-2009-425.nasl

Version: 1.1

Type: local

Published: 1/14/2026

Updated: 1/14/2026

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

Vendor

Vendor Severity: High

CVSS v2

Risk Factor: Low

Base Score: 2.6

Temporal Score: 1.9

Vector: CVSS2#AV:N/AC:H/Au:N/C:N/I:P/A:N

CVSS Score Source: CVE-2009-4022

CVSS v3

Risk Factor: Medium

Base Score: 5.9

Temporal Score: 5.2

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:miracle:linux:bind-libs, p-cpe:/a:miracle:linux:bind-chroot, p-cpe:/a:miracle:linux:bind-devel, p-cpe:/a:miracle:linux:bind, p-cpe:/a:miracle:linux:bind-utils, cpe:/o:miracle:linux:3, p-cpe:/a:miracle:linux:caching-nameserver

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/MiracleLinux/release, Host/MiracleLinux/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 12/4/2009

Vulnerability Publication Date: 11/23/2009

Reference Information

CVE: CVE-2009-4022