Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2009-4022

Unspecified vulnerability in ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P4, 9.5 before 9.5.2-P1, 9.6 before 9.6.1-P2, and 9.7 beta before 9.7.0b3, with DNSSEC validation enabled and checking disabled (CD), allows remote attackers to conduct DNS cache poisoning attacks by receiving a recursive client query and sending a response that contains an Additional section with crafted data, which is not properly handled when the response is processed "at the same time as requesting DNSSEC records (DO)," aka Bug 20438.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.2
EPSS Ranking 95.3%
CVSS Severity
CVSS v2 Score 2.6
References
Products affected by CVE-2009-4022
  • Isc » Bind » Version: 9.0
    cpe:2.3:a:isc:bind:9.0
  • Isc » Bind » Version: 9.0.0
    cpe:2.3:a:isc:bind:9.0.0
  • Isc » Bind » Version: 9.0.1
    cpe:2.3:a:isc:bind:9.0.1
  • Isc » Bind » Version: 9.1
    cpe:2.3:a:isc:bind:9.1
  • Isc » Bind » Version: 9.1.0
    cpe:2.3:a:isc:bind:9.1.0
  • Isc » Bind » Version: 9.1.1
    cpe:2.3:a:isc:bind:9.1.1
  • Isc » Bind » Version: 9.1.2
    cpe:2.3:a:isc:bind:9.1.2
  • Isc » Bind » Version: 9.1.3
    cpe:2.3:a:isc:bind:9.1.3
  • Isc » Bind » Version: 9.2
    cpe:2.3:a:isc:bind:9.2
  • Isc » Bind » Version: 9.2.0
    cpe:2.3:a:isc:bind:9.2.0
  • Isc » Bind » Version: 9.2.1
    cpe:2.3:a:isc:bind:9.2.1
  • Isc » Bind » Version: 9.2.2
    cpe:2.3:a:isc:bind:9.2.2
  • Isc » Bind » Version: 9.2.3
    cpe:2.3:a:isc:bind:9.2.3
  • Isc » Bind » Version: 9.2.4
    cpe:2.3:a:isc:bind:9.2.4
  • Isc » Bind » Version: 9.2.5
    cpe:2.3:a:isc:bind:9.2.5
  • Isc » Bind » Version: 9.2.6
    cpe:2.3:a:isc:bind:9.2.6
  • Isc » Bind » Version: 9.2.7
    cpe:2.3:a:isc:bind:9.2.7
  • Isc » Bind » Version: 9.2.8
    cpe:2.3:a:isc:bind:9.2.8
  • Isc » Bind » Version: 9.2.9
    cpe:2.3:a:isc:bind:9.2.9
  • Isc » Bind » Version: 9.3
    cpe:2.3:a:isc:bind:9.3
  • Isc » Bind » Version: 9.3.0
    cpe:2.3:a:isc:bind:9.3.0
  • Isc » Bind » Version: 9.3.1
    cpe:2.3:a:isc:bind:9.3.1
  • Isc » Bind » Version: 9.3.2
    cpe:2.3:a:isc:bind:9.3.2
  • Isc » Bind » Version: 9.3.3
    cpe:2.3:a:isc:bind:9.3.3
  • Isc » Bind » Version: 9.3.4
    cpe:2.3:a:isc:bind:9.3.4
  • Isc » Bind » Version: 9.3.5
    cpe:2.3:a:isc:bind:9.3.5
  • Isc » Bind » Version: 9.3.6
    cpe:2.3:a:isc:bind:9.3.6
  • Isc » Bind » Version: 9.4.0
    cpe:2.3:a:isc:bind:9.4.0
  • Isc » Bind » Version: 9.4.1
    cpe:2.3:a:isc:bind:9.4.1
  • Isc » Bind » Version: 9.4.2
    cpe:2.3:a:isc:bind:9.4.2
  • Isc » Bind » Version: 9.4.3
    cpe:2.3:a:isc:bind:9.4.3
  • Isc » Bind » Version: 9.5.0
    cpe:2.3:a:isc:bind:9.5.0
  • Isc » Bind » Version: 9.5.1
    cpe:2.3:a:isc:bind:9.5.1
  • Isc » Bind » Version: 9.5.2
    cpe:2.3:a:isc:bind:9.5.2
  • Isc » Bind » Version: 9.6.0
    cpe:2.3:a:isc:bind:9.6.0
  • Isc » Bind » Version: 9.6.1
    cpe:2.3:a:isc:bind:9.6.1
  • Isc » Bind » Version: 9.7.0
    cpe:2.3:a:isc:bind:9.7.0


Contact Us

Shodan ® - All rights reserved