SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   BIND Vendors:   ISC (Internet Software Consortium)
(OpenBSD Issues Fix) BIND Signature Validation Flaw Lets Remote Users Bypass Validation Checks
SecurityTracker Alert ID:  1021599
SecurityTracker URL:  http://securitytracker.com/id/1021599
CVE Reference:   CVE-2009-0025   (Links to External Site)
Date:  Jan 15 2009
Impact:   Modification of authentication information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 9.4.3 and prior versions
Description:   A vulnerability was reported in BIND. A remote user can bypass digital signature validation.

The software does not properly check the results of the OpenSSL DSA_verify() function. As a result, a remote server can supply a specially crafted invalid signature on a certificate that will be detected as a valid certificate. Signature checks on DSA and ECDSA keys used with SSL/TLS are affected.

Clients that connect to servers using RSA keys are not affected.

Client certificate validation is not affected.

Impact:   A remote user can bypass certificate validation.
Solution:   OpenBSD has released a fix.

Patch for OpenBSD 4.3:

ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/008_bind.patch

Patch for OpenBSD 4.4:

ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/008_bind.patch

Vendor URL:  www.isc.org/software/bind (Links to External Site)
Cause:   State error
Underlying OS:  UNIX (OpenBSD)
Underlying OS Comments:  4.3, 4.4

Message History:   This archive entry is a follow-up to the message listed below.
Jan 7 2009 BIND Signature Validation Flaw Lets Remote Users Bypass Validation Checks



 Source Message Contents

Subject:  bind CVE-2009-0025: incorrect DSA verification checks


Some exploitable logic errors have been found in the bind nameserver's
use of OpenSSL DSA verification functions. These errors may permit an
attacker to bypass validation of DSA DNSSEC signatures.

This vulnerability has been designated CVE-2009-0025. More information
is available from the ISC at:

  https://www.isc.org/node/373

Source code patches are available for OpenBSD 4.3 and 4.4. -current has
had an identical fix applied.

Patch for OpenBSD 4.3:
  ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/008_bind.patch

Patch for OpenBSD 4.4:
  ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/008_bind.patch

These patches are also available in the OPENBSD_4_3 and OPENBSD_4_4
stable CVS branches.

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC