fkie_cve-2009-0696
Vulnerability from fkie_nvd
Published
2009-07-29 17:30
Modified
2025-04-09 00:30
Severity ?
Summary
The dns_db_findrdataset function in db.c in named in ISC BIND 9.4 before 9.4.3-P3, 9.5 before 9.5.1-P3, and 9.6 before 9.6.1-P1, when configured as a master server, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via an ANY record in the prerequisite section of a crafted dynamic update message, as exploited in the wild in July 2009.
References
cret@cert.orgftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2009-013.txt.asc
cret@cert.orgftp://ftp.sco.com/pub/unixware7/714/security/p535243_uw7/p535243b.txt
cret@cert.orghttp://aix.software.ibm.com/aix/efixes/security/bind_advisory.asc
cret@cert.orghttp://bugs.debian.org/cgi-bin/bugreport.cgi?bug=538975
cret@cert.orghttp://secunia.com/advisories/36035
cret@cert.orghttp://secunia.com/advisories/36038
cret@cert.orghttp://secunia.com/advisories/36050
cret@cert.orghttp://secunia.com/advisories/36053
cret@cert.orghttp://secunia.com/advisories/36056
cret@cert.orghttp://secunia.com/advisories/36063
cret@cert.orghttp://secunia.com/advisories/36086
cret@cert.orghttp://secunia.com/advisories/36098
cret@cert.orghttp://secunia.com/advisories/36192
cret@cert.orghttp://secunia.com/advisories/37471
cret@cert.orghttp://secunia.com/advisories/39334
cret@cert.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-26-264828-1
cret@cert.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-77-1020788.1-1
cret@cert.orghttp://up2date.astaro.com/2009/08/up2date_7505_released.html
cret@cert.orghttp://wiki.rpath.com/Advisories:rPSA-2009-0113
cret@cert.orghttp://www.kb.cert.org/vuls/id/725188US Government Resource
cret@cert.orghttp://www.openbsd.org/errata44.html#014_bind
cret@cert.orghttp://www.securityfocus.com/archive/1/505403/100/0/threaded
cret@cert.orghttp://www.securityfocus.com/archive/1/507985/100/0/threaded
cret@cert.orghttp://www.securitytracker.com/id?1022613
cret@cert.orghttp://www.slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.561499
cret@cert.orghttp://www.ubuntu.com/usn/usn-808-1
cret@cert.orghttp://www.vmware.com/security/advisories/VMSA-2009-0016.html
cret@cert.orghttp://www.vupen.com/english/advisories/2009/2036
cret@cert.orghttp://www.vupen.com/english/advisories/2009/2088
cret@cert.orghttp://www.vupen.com/english/advisories/2009/2171
cret@cert.orghttp://www.vupen.com/english/advisories/2009/2247
cret@cert.orghttp://www.vupen.com/english/advisories/2009/3316
cret@cert.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10414
cret@cert.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12245
cret@cert.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7806
cret@cert.orghttps://www.isc.org/node/474Patch, Vendor Advisory
cret@cert.orghttps://www.redhat.com/archives/fedora-package-announce/2009-July/msg01265.html
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2009-013.txt.asc
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.sco.com/pub/unixware7/714/security/p535243_uw7/p535243b.txt
af854a3a-2127-422b-91ae-364da2661108http://aix.software.ibm.com/aix/efixes/security/bind_advisory.asc
af854a3a-2127-422b-91ae-364da2661108http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=538975
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36035
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36038
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36050
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36053
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36056
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36063
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36086
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36098
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36192
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/37471
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/39334
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-264828-1
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020788.1-1
af854a3a-2127-422b-91ae-364da2661108http://up2date.astaro.com/2009/08/up2date_7505_released.html
af854a3a-2127-422b-91ae-364da2661108http://wiki.rpath.com/Advisories:rPSA-2009-0113
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/725188US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.openbsd.org/errata44.html#014_bind
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/505403/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/507985/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1022613
af854a3a-2127-422b-91ae-364da2661108http://www.slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.561499
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-808-1
af854a3a-2127-422b-91ae-364da2661108http://www.vmware.com/security/advisories/VMSA-2009-0016.html
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/2036
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/2088
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/2171
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/2247
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/3316
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10414
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12245
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7806
af854a3a-2127-422b-91ae-364da2661108https://www.isc.org/node/474Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01265.html
Impacted products
Vendor Product Version
isc bind 9.4
isc bind 9.4.0
isc bind 9.4.0
isc bind 9.4.0
isc bind 9.4.0
isc bind 9.4.0
isc bind 9.4.0
isc bind 9.4.0
isc bind 9.4.0
isc bind 9.4.0
isc bind 9.4.0
isc bind 9.4.0
isc bind 9.4.0
isc bind 9.4.0
isc bind 9.4.1
isc bind 9.4.2
isc bind 9.4.2
isc bind 9.4.2
isc bind 9.4.3
isc bind 9.4.3
isc bind 9.4.3
isc bind 9.4.3
isc bind 9.4.3
isc bind 9.5
isc bind 9.5.0
isc bind 9.5.0
isc bind 9.5.0
isc bind 9.5.0
isc bind 9.5.0
isc bind 9.5.0
isc bind 9.5.0
isc bind 9.5.0
isc bind 9.5.0
isc bind 9.5.0
isc bind 9.5.0
isc bind 9.5.0
isc bind 9.5.0
isc bind 9.5.0
isc bind 9.5.0
isc bind 9.6
isc bind 9.6
isc bind 9.6
isc bind 9.6
isc bind 9.6
isc bind 9.6
isc bind 9.6
isc bind 9.6
isc bind 9.6
isc bind 9.6
isc bind 9.6
isc bind 9.6
isc bind 9.6
isc bind 9.6
isc bind 9.6
isc bind 9.6
isc bind 9.6
isc bind 9.6
isc bind 9.6.0
isc bind 9.6.0
isc bind 9.6.0
isc bind 9.6.0
isc bind 9.6.0
isc bind 9.6.0
isc bind 9.6.1
isc bind 9.6.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C8B18D7-4D15-46A7-8013-E6267127A427",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D7C7524-6943-4D94-8835-0221F0F0CD63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.0:a1:*:*:*:*:*:*",
              "matchCriteriaId": "C4B45FE3-307E-4599-B2CF-5203FA606469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.0:a2:*:*:*:*:*:*",
              "matchCriteriaId": "F12E3841-1CF0-4969-A286-50769BAE31EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.0:a3:*:*:*:*:*:*",
              "matchCriteriaId": "D8B11586-1274-422D-873A-25DF193FB0C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.0:a4:*:*:*:*:*:*",
              "matchCriteriaId": "87D61CDA-BB78-4957-A502-6D77B567B3F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.0:a5:*:*:*:*:*:*",
              "matchCriteriaId": "5A31533C-BD6E-4EB4-8047-3257BF51F592",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.0:a6:*:*:*:*:*:*",
              "matchCriteriaId": "D8537C88-4F73-43DD-9BDC-AF470882EED2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "6D7D1A96-0A8E-4E3A-9442-701E3D1A1F5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "93C23313-817F-4AB5-9058-31B0C7F954A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.0:b3:*:*:*:*:*:*",
              "matchCriteriaId": "FA9F93EC-1AA2-43A6-9869-8974C819370A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.0:b4:*:*:*:*:*:*",
              "matchCriteriaId": "726720E2-4B59-4665-A72E-E2E996957EAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "8F0AA9D0-9657-4E18-BF8B-45284C2D40A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "32E4FEA8-A654-4E9F-8948-5878E7C427C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "916D4013-27A5-4688-A985-A9B77F90AC45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8583B8D-54A4-4064-810B-34F4F5A33A36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "932E3F02-DD98-43FC-8077-50506E512989",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "63C2A2FD-7AE7-462A-99B2-809BE1F35C15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E01A12DF-E94B-426E-8751-96FC56105D5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.3:b1:*:*:*:*:*:*",
              "matchCriteriaId": "7717B1A2-CAF5-49F3-AC73-273074BBEE02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.3:b2:*:*:*:*:*:*",
              "matchCriteriaId": "F037EE61-50D6-4C1E-B24B-25A6D212E7E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.3:b3:*:*:*:*:*:*",
              "matchCriteriaId": "5140F118-BC25-43CB-B19C-0885A44D6646",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.4.3:p2:*:*:*:*:*:*",
              "matchCriteriaId": "82B9397F-463E-4F73-86F6-4EF3368E14BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A944178-032B-4637-842D-BC6B227043A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "32CEF8AD-9EE7-4ADA-888E-883751962529",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.5.0:a1:*:*:*:*:*:*",
              "matchCriteriaId": "76B4ED8A-9182-4403-8F66-3EB360E73477",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.5.0:a2:*:*:*:*:*:*",
              "matchCriteriaId": "84046EF9-AF5F-43FA-8E2C-11C7A01D17F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.5.0:a3:*:*:*:*:*:*",
              "matchCriteriaId": "7545BB70-5C74-47A7-BB07-765BC8C2A5A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.5.0:a4:*:*:*:*:*:*",
              "matchCriteriaId": "AE6BFDBD-DE4D-407F-86A4-FA78F99AA531",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.5.0:a5:*:*:*:*:*:*",
              "matchCriteriaId": "4337C3FF-C15B-4EFD-AA13-F9CA0542C2FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.5.0:a6:*:*:*:*:*:*",
              "matchCriteriaId": "AB6534DE-1ACB-4BCE-87A4-901F02F6CDCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.5.0:a7:*:*:*:*:*:*",
              "matchCriteriaId": "BE5F1A64-2428-4F85-8B93-3E324E983D2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.5.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "5F5D6222-3C1D-42FA-8882-1EE28B94D900",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.5.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "08899782-3182-46EB-947D-3BA9C371ACA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.5.0:b3:*:*:*:*:*:*",
              "matchCriteriaId": "575443B1-1638-497E-BCCF-E725B386ED88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.5.0:p1:*:*:*:*:*:*",
              "matchCriteriaId": "30616740-FC69-4B92-B997-B7AF7643656D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.5.0:p2:*:*:*:*:*:*",
              "matchCriteriaId": "3E306D3A-11AE-4F35-971E-B47D47628052",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.5.0:p2_w1:*:*:*:*:*:*",
              "matchCriteriaId": "4FF37B1D-04AD-4E37-A238-34BE7C5311E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.5.0:p2_w2:*:*:*:*:*:*",
              "matchCriteriaId": "6AAEE115-8EA0-4E2B-9960-647967B39606",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.6:*:*:*:esv:*:*:*",
              "matchCriteriaId": "6C8BE53C-2A4A-4959-AA97-5ABC04CC0E72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.6:r1:*:*:esv:*:*:*",
              "matchCriteriaId": "2677A691-12FF-40D9-90FD-772CE3C5A9B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.6:r2:*:*:esv:*:*:*",
              "matchCriteriaId": "D8A7089F-C797-4024-AFC1-E0E6458DE848",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.6:r3:*:*:esv:*:*:*",
              "matchCriteriaId": "7DD82385-C550-4B18-98EA-D98E3091BB45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.6:r4:*:*:esv:*:*:*",
              "matchCriteriaId": "3A33A726-ED5B-45EB-8474-9298AE99DA6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.6:r4_p1:*:*:esv:*:*:*",
              "matchCriteriaId": "F87EAE50-93EC-4297-8E05-0E904CC24272",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.6:r5:*:*:esv:*:*:*",
              "matchCriteriaId": "0D2999C4-F1DC-4DD7-9302-C148EB3E9732",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.6:r5_b1:*:*:esv:*:*:*",
              "matchCriteriaId": "275EA814-22C2-4B38-B26A-ACD393414DB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.6:r5_p1:*:*:esv:*:*:*",
              "matchCriteriaId": "3E41290E-0F4A-4113-BBE1-BC33EBDB7141",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.6:r6:*:*:esv:*:*:*",
              "matchCriteriaId": "EB714DDF-DA52-4E7C-B40F-DE2A85901998",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.6:r6_b1:*:*:esv:*:*:*",
              "matchCriteriaId": "21AE1593-38AC-4345-BD69-6589627A10FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.6:r6_rc1:*:*:esv:*:*:*",
              "matchCriteriaId": "9BC239C2-22E1-4E12-888C-C002C2CD1B9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.6:r6_rc2:*:*:esv:*:*:*",
              "matchCriteriaId": "7C21A765-6EB9-4213-BD35-FBD0E5C6A63C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.6:r7:*:*:esv:*:*:*",
              "matchCriteriaId": "9CEDA8E0-A429-4099-96B2-F63EAA9B33FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.6:r7_p1:*:*:esv:*:*:*",
              "matchCriteriaId": "4FEFE357-E5A6-4B22-8A30-25C9100BBCFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.6:r7_p2:*:*:esv:*:*:*",
              "matchCriteriaId": "F846EB9A-DE66-44F9-AEB8-A297D18CFF16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.6:r9:*:*:esv:*:*:*",
              "matchCriteriaId": "777724C0-3259-4D40-82F6-4588CA79A819",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.6:r9_p1:*:*:esv:*:*:*",
              "matchCriteriaId": "F0CB9332-22B3-48AC-919A-A4E5F43D9B8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F42F7AF7-D37C-4213-B2BC-D2B9FE725BDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.6.0:a1:*:*:*:*:*:*",
              "matchCriteriaId": "A964450E-7DA8-478B-923E-E8CD1BA0F09C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.6.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "32FAE1EF-3BF0-4B12-8F08-AA061A6D63FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.6.0:p1:*:*:*:*:*:*",
              "matchCriteriaId": "5ABB3FC8-0A0D-4881-9137-5F6A8CCB9345",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.6.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "C02A3BC0-78A4-4F4D-AA5B-3C05122137EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.6.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "178C7D9F-8699-42A3-8729-0BC6323EBDF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BEF53C6-E555-49D4-B4B2-63BA71CC77E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.6.1:b1:*:*:*:*:*:*",
              "matchCriteriaId": "2B4565A6-122B-406C-A7BE-A029F92799B5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The dns_db_findrdataset function in db.c in named in ISC BIND 9.4 before 9.4.3-P3, 9.5 before 9.5.1-P3, and 9.6 before 9.6.1-P1, when configured as a master server, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via an ANY record in the prerequisite section of a crafted dynamic update message, as exploited in the wild in July 2009."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n  dns_db_findrdataset en db.c en \"named\" en ISC BIND v9.4 anterior a v9.4.3-P3, v9.5 anterior a v9.5.1-P3, y v9.6 anterior a v9.6.1-P1, cuando est\u00e1 configurado como un servidor maestro, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (fallo de aserci\u00f3n y salida de demonio) a trav\u00e9s de cualquier registro en la secci\u00f3n prerequerida de un mensaje de actualizaci\u00f3n din\u00e1mico manipulado, tal como se ha explotado en julio de 2009."
    }
  ],
  "id": "CVE-2009-0696",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-07-29T17:30:00.920",
  "references": [
    {
      "source": "cret@cert.org",
      "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2009-013.txt.asc"
    },
    {
      "source": "cret@cert.org",
      "url": "ftp://ftp.sco.com/pub/unixware7/714/security/p535243_uw7/p535243b.txt"
    },
    {
      "source": "cret@cert.org",
      "url": "http://aix.software.ibm.com/aix/efixes/security/bind_advisory.asc"
    },
    {
      "source": "cret@cert.org",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=538975"
    },
    {
      "source": "cret@cert.org",
      "url": "http://secunia.com/advisories/36035"
    },
    {
      "source": "cret@cert.org",
      "url": "http://secunia.com/advisories/36038"
    },
    {
      "source": "cret@cert.org",
      "url": "http://secunia.com/advisories/36050"
    },
    {
      "source": "cret@cert.org",
      "url": "http://secunia.com/advisories/36053"
    },
    {
      "source": "cret@cert.org",
      "url": "http://secunia.com/advisories/36056"
    },
    {
      "source": "cret@cert.org",
      "url": "http://secunia.com/advisories/36063"
    },
    {
      "source": "cret@cert.org",
      "url": "http://secunia.com/advisories/36086"
    },
    {
      "source": "cret@cert.org",
      "url": "http://secunia.com/advisories/36098"
    },
    {
      "source": "cret@cert.org",
      "url": "http://secunia.com/advisories/36192"
    },
    {
      "source": "cret@cert.org",
      "url": "http://secunia.com/advisories/37471"
    },
    {
      "source": "cret@cert.org",
      "url": "http://secunia.com/advisories/39334"
    },
    {
      "source": "cret@cert.org",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-264828-1"
    },
    {
      "source": "cret@cert.org",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020788.1-1"
    },
    {
      "source": "cret@cert.org",
      "url": "http://up2date.astaro.com/2009/08/up2date_7505_released.html"
    },
    {
      "source": "cret@cert.org",
      "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0113"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/725188"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.openbsd.org/errata44.html#014_bind"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.securityfocus.com/archive/1/505403/100/0/threaded"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.securitytracker.com/id?1022613"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.561499"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.ubuntu.com/usn/usn-808-1"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.vupen.com/english/advisories/2009/2036"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.vupen.com/english/advisories/2009/2088"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.vupen.com/english/advisories/2009/2171"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.vupen.com/english/advisories/2009/2247"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.vupen.com/english/advisories/2009/3316"
    },
    {
      "source": "cret@cert.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10414"
    },
    {
      "source": "cret@cert.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12245"
    },
    {
      "source": "cret@cert.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7806"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.isc.org/node/474"
    },
    {
      "source": "cret@cert.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01265.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2009-013.txt.asc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://ftp.sco.com/pub/unixware7/714/security/p535243_uw7/p535243b.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://aix.software.ibm.com/aix/efixes/security/bind_advisory.asc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=538975"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/36035"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/36038"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/36050"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/36053"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/36056"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/36063"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/36086"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/36098"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/36192"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/37471"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/39334"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-264828-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020788.1-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://up2date.astaro.com/2009/08/up2date_7505_released.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0113"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/725188"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openbsd.org/errata44.html#014_bind"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/505403/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1022613"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.561499"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-808-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2009/2036"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2009/2088"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2009/2171"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2009/2247"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2009/3316"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10414"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12245"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7806"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.isc.org/node/474"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01265.html"
    }
  ],
  "sourceIdentifier": "cret@cert.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-16"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…