Lucene search

K
ubuntuUbuntuUSN-706-1
HistoryJan 09, 2009 - 12:00 a.m.

Bind vulnerability

2009-01-0900:00:00
ubuntu.com
42

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

7.7 High

AI Score

Confidence

High

0.019 Low

EPSS

Percentile

88.4%

Releases

  • Ubuntu 8.10
  • Ubuntu 8.04
  • Ubuntu 7.10
  • Ubuntu 6.06

Packages

  • bind9 -

Details

It was discovered that Bind did not properly perform signature verification.
When DNSSEC with DSA signatures are in use, a remote attacker could exploit
this to bypass signature validation to spoof DNS entries and poison DNS
caches. Among other things, this could lead to misdirected email and web
traffic.

OSVersionArchitecturePackageVersionFilename
Ubuntu8.10noarchlibdns43< 1:9.5.0.dfsg.P2-1ubuntu3.1UNKNOWN
Ubuntu8.10noarchbind9< 1:9.5.0.dfsg.P2-1ubuntu3.1UNKNOWN
Ubuntu8.10noarchbind9< host-1:9.5.0.dfsg.P2-1ubuntu3.1UNKNOWN
Ubuntu8.10noarchbind9< tils-1:9.5.0.dfsg.P2-1ubuntu3.1UNKNOWN
Ubuntu8.10noarchdnsutils< 1:9.5.0.dfsg.P2-1ubuntu3.1UNKNOWN
Ubuntu8.10noarchlibbind-dev< 1:9.5.0.dfsg.P2-1ubuntu3.1UNKNOWN
Ubuntu8.10noarchlibbind9-40< 1:9.5.0.dfsg.P2-1ubuntu3.1UNKNOWN
Ubuntu8.10noarchlibisc44< 1:9.5.0.dfsg.P2-1ubuntu3.1UNKNOWN
Ubuntu8.10noarchlibisccc40< 1:9.5.0.dfsg.P2-1ubuntu3.1UNKNOWN
Ubuntu8.10noarchlibisccfg40< 1:9.5.0.dfsg.P2-1ubuntu3.1UNKNOWN
Rows per page:
1-10 of 451

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

7.7 High

AI Score

Confidence

High

0.019 Low

EPSS

Percentile

88.4%