ISC BIND 9 EVP_VerifyFinal() / DSA_do_verify() SSL/TLS Signature Validation Weakness

Medium Nessus Plugin ID 38735

Synopsis

The remote name server is affected by a signature validation weakness.

Description

According to its version number, the remote installation of BIND does not properly check the return value from the OpenSSL library functions 'EVP_VerifyFinal()' and 'DSA_do_verify()'. A remote attacker may be able to exploit this weakness to spoof answers returned from zones for signature checks on DSA and ECDSA keys used with SSL / TLS.

Solution

Upgrade to BIND 9.3.6-P1 / 9.4.3-P1 / 9.5.1-P1 / 9.6.0-P1 or later.

See Also

http://www.nessus.org/u?a61b5626

Plugin Details

Severity: Medium

ID: 38735

File Name: bind_sig_return_checks.nasl

Version: 1.18

Type: remote

Family: DNS

Published: 2009/05/12

Updated: 2018/06/27

Dependencies: 10028, 35373

Configuration: Enable paranoid mode

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:isc:bind

Required KB Items: bind/version, DNSSEC/udp/53, Settings/ParanoidReport

Exploit Available: false

Exploit Ease: No known exploits are available

Reference Information

CVE: CVE-2009-0025

BID: 33151

Secunia: 33404

CWE: 287