CentOS 3 / 4 / 5 : bind (CESA-2009:0020)

Medium Nessus Plugin ID 35589

Synopsis

The remote CentOS host is missing one or more security updates.

Description

Updated Bind packages to correct a security issue are now available for Red Hat Enterprise Linux 2.1, 3, 4, and 5.

This update has been rated as having moderate security impact by the Red Hat Security Response Team.

BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols.

A flaw was discovered in the way BIND checked the return value of the OpenSSL DSA_do_verify function. On systems using DNSSEC, a malicious zone could present a malformed DSA certificate and bypass proper certificate validation, allowing spoofing attacks. (CVE-2009-0025)

For users of Red Hat Enterprise Linux 3 this update also addresses a bug which can cause BIND to occasionally exit with an assertion failure.

All BIND users are advised to upgrade to the updated package, which contains a backported patch to resolve this issue. After installing the update, BIND daemon will be restarted automatically.

Solution

Update the affected bind packages.

See Also

http://www.nessus.org/u?7c51a33c

http://www.nessus.org/u?9caf8ad4

http://www.nessus.org/u?7b980532

http://www.nessus.org/u?4529c1ca

http://www.nessus.org/u?0ce14458

http://www.nessus.org/u?4482a8b0

http://www.nessus.org/u?baa9fda1

http://www.nessus.org/u?7076ada0

Plugin Details

Severity: Medium

ID: 35589

File Name: centos_RHSA-2009-0020.nasl

Version: 1.17

Type: local

Agent: unix

Published: 2009/02/05

Updated: 2019/10/03

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:centos:centos:bind, p-cpe:/a:centos:centos:bind-chroot, p-cpe:/a:centos:centos:bind-devel, p-cpe:/a:centos:centos:bind-libbind-devel, p-cpe:/a:centos:centos:bind-libs, p-cpe:/a:centos:centos:bind-sdb, p-cpe:/a:centos:centos:bind-utils, p-cpe:/a:centos:centos:caching-nameserver, cpe:/o:centos:centos:3, cpe:/o:centos:centos:4, cpe:/o:centos:centos:5

Required KB Items: Host/local_checks_enabled, Host/CentOS/release, Host/CentOS/rpm-list

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2009/02/04

Vulnerability Publication Date: 2009/01/07

Reference Information

CVE: CVE-2008-5077, CVE-2009-0021, CVE-2009-0025, CVE-2009-0046, CVE-2009-0047, CVE-2009-0048, CVE-2009-0049, CVE-2009-0124, CVE-2009-0125, CVE-2009-0127, CVE-2009-0128, CVE-2009-0130

BID: 33151

RHSA: 2009:0020

CWE: 20, 287