Unspecified vulnerability in ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P4, 9.5 before 9.5.2-P1, 9.6 before 9.6.1-P2, and 9.7 beta before 9.7.0b3, with DNSSEC validation enabled and checking disabled (CD), allows remote attackers to conduct DNS cache poisoning attacks by receiving a recursive client query and sending a response that contains an Additional section with crafted data, which is not properly handled when the response is processed "at the same time as requesting DNSSEC records (DO)," aka Bug 20438.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1961-1 | New bind9 packages fix cache poisoning |
Ubuntu USN |
USN-865-1 | Bind vulnerability |
Ubuntu USN |
USN-888-1 | Bind vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T06:45:50.986Z
Reserved: 2009-11-20T00:00:00
Link: CVE-2009-4022
No data.
Status : Deferred
Published: 2009-11-25T16:30:00.937
Modified: 2025-04-09T00:30:58.490
Link: CVE-2009-4022
OpenCVE Enrichment
No data.
Debian DSA
Ubuntu USN