Wind River Support Network

HomeOther DownloadsSecurity Advisory - BIND - CVE-2009-0025
Recommended Type: Patch

Security Advisory - BIND - CVE-2009-0025

Released: Apr 28, 2009     Updated: Apr 28, 2009

Description

BIND 9.4.3 and earlier does not properly check the return value from the OpenSSL DSA_verify function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077.


Product Version

Linux Platforms 1.x

Downloads


Installation Notes

Installation Notes

WIND00152449.zip is for 1.4
WIND00152452.zip is for 1.5
1. Unzip the patch under [install_dir]/updates 
2. Install the patch CD by entering the patch CD directory and run setup_linux. 
3. This is a source only patch so you will have to build the kernel 
4. Issue a make fs and make the kernel in a configured directory. 
5. Upload the kernel and rootfs into the target and boot it up.


Live chat
Online