Wind River Support Network

HomeOther DownloadsSecurity Advisory - BIND - CVE-2009-0025
Recommended Type: Patch

Security Advisory - BIND - CVE-2009-0025

Released: Apr 28, 2009     Updated: Apr 28, 2009


BIND 9.4.3 and earlier does not properly check the return value from the OpenSSL DSA_verify function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077.

Product Version

Linux Platforms 1.x


Installation Notes

Installation Notes is for 1.4 is for 1.5
1. Unzip the patch under [install_dir]/updates 
2. Install the patch CD by entering the patch CD directory and run setup_linux. 
3. This is a source only patch so you will have to build the kernel 
4. Issue a make fs and make the kernel in a configured directory. 
5. Upload the kernel and rootfs into the target and boot it up.

Live chat