CVE-2010-0290

NameCVE-2010-0290
DescriptionUnspecified vulnerability in ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P5, 9.5 before 9.5.2-P2, 9.6 before 9.6.1-P3, and 9.7.0 beta, with DNSSEC validation enabled and checking disabled (CD), allows remote attackers to conduct DNS cache poisoning attacks by receiving a recursive client query and sending a response that contains (1) CNAME or (2) DNAME records, which do not have the intended validation before caching, aka Bug 20737. NOTE: this vulnerability exists because of an incomplete fix for CVE-2009-4022.
SourceCVE (at NVD; oss-sec, fulldisc, OSVDB, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, more)
ReferencesDSA-2054-1
NVD severitymedium (attack range: remote)
Debian/oldoldstablenot vulnerable.
Debian/oldstablenot vulnerable.
Debian/stablenot vulnerable.
Debian/testingnot vulnerable.
Debian/unstablenot vulnerable.

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
bind9 (PTS)squeeze, squeeze (security)1:9.7.3.dfsg-1~squeeze11fixed
squeeze (lts)1:9.7.3.dfsg-1~squeeze14fixed
wheezy1:9.8.4.dfsg.P1-6+nmu2+deb7u3fixed
wheezy (security)1:9.8.4.dfsg.P1-6+nmu2+deb7u4fixed
stretch, sid, jessie1:9.9.5.dfsg-9fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
bind9source(unstable)1:9.7.0.dfsg-1medium
bind9sourcelenny1:9.6.ESV.R1+dfsg-0+lenny1mediumDSA-2054-1

Notes

https://bugzilla.redhat.com/show_bug.cgi?id=554851#c7

Search for package or bug name: Reporting problems