Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2009-0858 | First vendor Publication | 2009-03-09 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 5.8 | Attack Range | Network |
Cvss Impact Score | 4.9 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The response_addname function in response.c in Daniel J. Bernstein djbdns 1.05 and earlier does not constrain offsets in the required manner, which allows remote attackers, with control over a third-party subdomain served by tinydns and axfrdns, to trigger DNS responses containing arbitrary records via crafted zone data for this subdomain. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0858 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-20 | Improper Input Validation |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:13695 | |||
Oval ID: | oval:org.mitre.oval:def:13695 | ||
Title: | DSA-1831-1 djbdns -- programming error | ||
Description: | Matthew Dempsky discovered that Daniel J. Bernstein's djbdns, a Domain Name System server, does not constrain offsets in the required manner, which allows remote attackers with control over a third-party subdomain served by tinydns and axfrdns, to trigger DNS responses containing arbitrary records via crafted zone data for this subdomain. The old stable distribution does not contain djbdns. For the stable distribution, this problem has been fixed in version 1.05-4+lenny1. For the unstable distribution, this problem has been fixed in version 1.05-5. We recommend that you upgrade your djbdns package. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1831-1 CVE-2009-0858 | Version: | 5 |
Platform(s): | Debian GNU/Linux 5.0 | Product(s): | djbdns |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:7951 | |||
Oval ID: | oval:org.mitre.oval:def:7951 | ||
Title: | DSA-1831 djbdns -- programming error | ||
Description: | Matthew Dempsky discovered that Daniel J. Bernstein's djbdns, a Domain Name System server, does not constrain offsets in the required manner, which allows remote attackers with control over a third-party subdomain served by tinydns and axfrdns, to trigger DNS responses containing arbitrary records via crafted zone data for this subdomain. The old stable distribution (etch) does not contain djbdns. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1831 CVE-2009-0858 | Version: | 5 |
Platform(s): | Debian GNU/Linux 5.0 | Product(s): | djbdns |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 |
OpenVAS Exploits
Date | Description |
---|---|
2009-07-29 | Name : Debian Security Advisory DSA 1831-1 (djbdns) File : nvt/deb_1831_1.nasl |
2009-07-29 | Name : Ubuntu USN-799-1 (dbus) File : nvt/ubuntu_799_1.nasl |
2009-07-29 | Name : Ubuntu USN-801-1 (tiff) File : nvt/ubuntu_801_1.nasl |
2009-07-29 | Name : Ubuntu USN-802-1 (apache2) File : nvt/ubuntu_802_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
52699 | djbdns response.c response_addname Function Response Packet Spoofing djbdns contains a flaw that may allow a malicious user to spoof DNS records for a domain where he has legitimate authority over a subdomain. The issue is triggered when axfrdns compresses some outgoing DNS packets incorrectly. It is possible that the flaw may allow spoofing DNS records resulting in a loss of integrity. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2010-02-24 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1831.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:11:57 |
|
2024-11-28 12:18:28 |
|
2021-05-04 12:09:14 |
|
2021-04-22 01:09:35 |
|
2020-05-23 01:40:08 |
|
2020-05-23 00:23:28 |
|
2018-10-11 00:19:32 |
|
2017-08-17 09:22:29 |
|
2016-04-26 18:41:26 |
|
2014-02-17 10:49:10 |
|
2013-05-10 23:45:54 |
|