CentOS 3 / 4 / 5 : bind (CESA-2009:0020)

medium Nessus Plugin ID 35589
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote CentOS host is missing one or more security updates.

Description

Updated Bind packages to correct a security issue are now available for Red Hat Enterprise Linux 2.1, 3, 4, and 5.

This update has been rated as having moderate security impact by the Red Hat Security Response Team.

BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols.

A flaw was discovered in the way BIND checked the return value of the OpenSSL DSA_do_verify function. On systems using DNSSEC, a malicious zone could present a malformed DSA certificate and bypass proper certificate validation, allowing spoofing attacks. (CVE-2009-0025)

For users of Red Hat Enterprise Linux 3 this update also addresses a bug which can cause BIND to occasionally exit with an assertion failure.

All BIND users are advised to upgrade to the updated package, which contains a backported patch to resolve this issue. After installing the update, BIND daemon will be restarted automatically.

Solution

Update the affected bind packages.

See Also

http://www.nessus.org/u?7c51a33c

http://www.nessus.org/u?9caf8ad4

http://www.nessus.org/u?7b980532

http://www.nessus.org/u?4529c1ca

http://www.nessus.org/u?0ce14458

http://www.nessus.org/u?4482a8b0

http://www.nessus.org/u?baa9fda1

http://www.nessus.org/u?7076ada0

Plugin Details

Severity: Medium

ID: 35589

File Name: centos_RHSA-2009-0020.nasl

Version: 1.20

Type: local

Agent: unix

Published: 2/5/2009

Updated: 1/4/2021

Dependencies: ssh_get_info.nasl

Risk Information

VPR

Risk Factor: Medium

Score: 6.6

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:centos:centos:bind, p-cpe:/a:centos:centos:bind-chroot, p-cpe:/a:centos:centos:bind-devel, p-cpe:/a:centos:centos:bind-libbind-devel, p-cpe:/a:centos:centos:bind-libs, p-cpe:/a:centos:centos:bind-sdb, p-cpe:/a:centos:centos:bind-utils, p-cpe:/a:centos:centos:caching-nameserver, cpe:/o:centos:centos:3, cpe:/o:centos:centos:4, cpe:/o:centos:centos:5

Required KB Items: Host/local_checks_enabled, Host/CentOS/release, Host/CentOS/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 2/4/2009

Vulnerability Publication Date: 1/7/2009

Reference Information

CVE: CVE-2008-5077, CVE-2009-0021, CVE-2009-0025, CVE-2009-0046, CVE-2009-0047, CVE-2009-0048, CVE-2009-0049, CVE-2009-0124, CVE-2009-0125, CVE-2009-0127, CVE-2009-0128, CVE-2009-0130

BID: 33151

RHSA: 2009:0020

CWE: 20, 287