Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2010-0290

Unspecified vulnerability in ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P5, 9.5 before 9.5.2-P2, 9.6 before 9.6.1-P3, and 9.7.0 beta, with DNSSEC validation enabled and checking disabled (CD), allows remote attackers to conduct DNS cache poisoning attacks by receiving a recursive client query and sending a response that contains (1) CNAME or (2) DNAME records, which do not have the intended validation before caching, aka Bug 20737. NOTE: this vulnerability exists because of an incomplete fix for CVE-2009-4022.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.049
EPSS Ranking 89.1%
CVSS Severity
CVSS v2 Score 4.0
References
Products affected by CVE-2010-0290
  • Isc » Bind » Version: 9.0
    cpe:2.3:a:isc:bind:9.0
  • Isc » Bind » Version: 9.0.0
    cpe:2.3:a:isc:bind:9.0.0
  • Isc » Bind » Version: 9.0.1
    cpe:2.3:a:isc:bind:9.0.1
  • Isc » Bind » Version: 9.1
    cpe:2.3:a:isc:bind:9.1
  • Isc » Bind » Version: 9.1.0
    cpe:2.3:a:isc:bind:9.1.0
  • Isc » Bind » Version: 9.1.1
    cpe:2.3:a:isc:bind:9.1.1
  • Isc » Bind » Version: 9.1.2
    cpe:2.3:a:isc:bind:9.1.2
  • Isc » Bind » Version: 9.1.3
    cpe:2.3:a:isc:bind:9.1.3
  • Isc » Bind » Version: 9.10.0
    cpe:2.3:a:isc:bind:9.10.0
  • Isc » Bind » Version: 9.10.1
    cpe:2.3:a:isc:bind:9.10.1
  • Isc » Bind » Version: 9.10.2
    cpe:2.3:a:isc:bind:9.10.2
  • Isc » Bind » Version: 9.10.3
    cpe:2.3:a:isc:bind:9.10.3
  • Isc » Bind » Version: 9.2
    cpe:2.3:a:isc:bind:9.2
  • Isc » Bind » Version: 9.2.0
    cpe:2.3:a:isc:bind:9.2.0
  • Isc » Bind » Version: 9.2.1
    cpe:2.3:a:isc:bind:9.2.1
  • Isc » Bind » Version: 9.2.2
    cpe:2.3:a:isc:bind:9.2.2
  • Isc » Bind » Version: 9.2.3
    cpe:2.3:a:isc:bind:9.2.3
  • Isc » Bind » Version: 9.2.4
    cpe:2.3:a:isc:bind:9.2.4
  • Isc » Bind » Version: 9.2.5
    cpe:2.3:a:isc:bind:9.2.5
  • Isc » Bind » Version: 9.2.6
    cpe:2.3:a:isc:bind:9.2.6
  • Isc » Bind » Version: 9.2.7
    cpe:2.3:a:isc:bind:9.2.7
  • Isc » Bind » Version: 9.2.8
    cpe:2.3:a:isc:bind:9.2.8
  • Isc » Bind » Version: 9.2.9
    cpe:2.3:a:isc:bind:9.2.9
  • Isc » Bind » Version: 9.3
    cpe:2.3:a:isc:bind:9.3
  • Isc » Bind » Version: 9.3.0
    cpe:2.3:a:isc:bind:9.3.0
  • Isc » Bind » Version: 9.3.1
    cpe:2.3:a:isc:bind:9.3.1
  • Isc » Bind » Version: 9.3.2
    cpe:2.3:a:isc:bind:9.3.2
  • Isc » Bind » Version: 9.3.3
    cpe:2.3:a:isc:bind:9.3.3
  • Isc » Bind » Version: 9.3.4
    cpe:2.3:a:isc:bind:9.3.4
  • Isc » Bind » Version: 9.3.5
    cpe:2.3:a:isc:bind:9.3.5
  • Isc » Bind » Version: 9.3.6
    cpe:2.3:a:isc:bind:9.3.6
  • Isc » Bind » Version: 9.4
    cpe:2.3:a:isc:bind:9.4
  • Isc » Bind » Version: 9.4.0
    cpe:2.3:a:isc:bind:9.4.0
  • Isc » Bind » Version: 9.4.1
    cpe:2.3:a:isc:bind:9.4.1
  • Isc » Bind » Version: 9.4.2
    cpe:2.3:a:isc:bind:9.4.2
  • Isc » Bind » Version: 9.4.3
    cpe:2.3:a:isc:bind:9.4.3
  • Isc » Bind » Version: 9.6.0
    cpe:2.3:a:isc:bind:9.6.0
  • Isc » Bind » Version: 9.6.1
    cpe:2.3:a:isc:bind:9.6.1
  • Isc » Bind » Version: 9.7.0
    cpe:2.3:a:isc:bind:9.7.0


Contact Us

Shodan ® - All rights reserved