CVE-2009-0696

Description

The dns_db_findrdataset function in db.c in named in ISC BIND 9.4 before 9.4.3-P3, 9.5 before 9.5.1-P3, and 9.6 before 9.6.1-P1, when configured as a master server, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via an ANY record in the prerequisite section of a crafted dynamic update message, as exploited in the wild in July 2009.

Category

4.3
CVSS
Severity: Medium
CVSS 2.0 •
EPSS 35.78% Top 5%
Vendor Advisory openbsd.org Vendor Advisory sun.com Vendor Advisory ubuntu.com Vendor Advisory redhat.com Vendor Advisory slackware.com Vendor Advisory netbsd.org Vendor Advisory sun.com Vendor Advisory isc.org
Affected: n/a n/a
Published at:
Updated at:

References

Link Tags
http://secunia.com/advisories/36035 third party advisory
http://secunia.com/advisories/36063 third party advisory
http://www.vupen.com/english/advisories/2009/2171 vdb entry
http://secunia.com/advisories/36056 third party advisory
http://secunia.com/advisories/36038 third party advisory
http://aix.software.ibm.com/aix/efixes/security/bind_advisory.asc
http://www.kb.cert.org/vuls/id/725188 third party advisory us government resource
http://secunia.com/advisories/37471 third party advisory
http://secunia.com/advisories/36050 third party advisory
http://www.openbsd.org/errata44.html#014_bind vendor advisory
http://www.securityfocus.com/archive/1/505403/100/0/threaded mailing list
http://secunia.com/advisories/36192 third party advisory
http://www.vmware.com/security/advisories/VMSA-2009-0016.html
http://www.vupen.com/english/advisories/2009/2088 vdb entry
http://www.securitytracker.com/id?1022613 vdb entry
https://www.isc.org/node/474 patch vendor advisory
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020788.1-1 vendor advisory
http://www.vupen.com/english/advisories/2009/2247 vdb entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7806 signature vdb entry
http://www.securityfocus.com/archive/1/507985/100/0/threaded mailing list
http://secunia.com/advisories/39334 third party advisory
http://www.vupen.com/english/advisories/2009/2036 vdb entry
http://wiki.rpath.com/Advisories:rPSA-2009-0113
http://secunia.com/advisories/36098 third party advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10414 signature vdb entry
http://up2date.astaro.com/2009/08/up2date_7505_released.html
http://www.ubuntu.com/usn/usn-808-1 vendor advisory
http://secunia.com/advisories/36086 third party advisory
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01265.html vendor advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12245 signature vdb entry
http://secunia.com/advisories/36053 third party advisory
ftp://ftp.sco.com/pub/unixware7/714/security/p535243_uw7/p535243b.txt
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.561499 vendor advisory
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2009-013.txt.asc vendor advisory
http://www.vupen.com/english/advisories/2009/3316 vdb entry
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=538975
http://sunsolve.sun.com/search/document.do?assetkey=1-26-264828-1 vendor advisory

Frequently Asked Questions

What is the severity of CVE-2009-0696?
CVE-2009-0696 has been scored as a medium severity vulnerability.
How to fix CVE-2009-0696?
To fix CVE-2009-0696, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2009-0696 being actively exploited in the wild?
It is possible that CVE-2009-0696 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~36% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.