CVE-2009-0265
Gentoo Linux Security Advisory 200903-14
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Internet Systems Consortium (ISC) BIND 9.6.0 and earlier does not properly check the return value from the OpenSSL EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077 and CVE-2009-0025.
Internet Systems Consortium (ISC) BIND en versiones 9.6.0 y anteriores no comprueba adecuadamente el valor de retorno de la función EVP_VerifyFinal de OpenSSL, lo cual permite a atacantes remotos eludir la validación del certificado a través de una firma SSL/TLS malformada, se trata de una vulnerabilidad similar a CVE-2008-5077 y CVE-2009-0025.
Incomplete verification of RSA and DSA certificates might lead to spoofed records authenticated using DNSSEC. BIND does not properly check the return value from the OpenSSL functions to verify DSA (CVE-2009-0025) and RSA (CVE-2009-0265) certificates. Versions less than 9.4.3_p1 are affected.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2009-01-26 CVE Reserved
- 2009-01-26 CVE Published
- 2024-08-07 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-252: Unchecked Return Value
- CWE-295: Improper Certificate Validation
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
http://groups.google.com/group/comp.protocols.dns.bind/browse_thread/thread/49ef622c8329fd33 | Mailing List | |
http://www.vupen.com/english/advisories/2009/0043 | Broken Link |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.540362 | 2024-02-13 |
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/33559 | 2024-02-13 | |
http://www.mandriva.com/security/advisories?name=MDVSA-2009:037 | 2024-02-13 | |
https://www.isc.org/node/373 | 2024-02-13 |