Source: bind9
Severity: important
Tags: security patch

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for bind9.

CVE-2009-0025[0]:
| BIND 9.4.3 and earlier does not properly check the return value from
| the OpenSSL DSA_verify function, which allows remote attackers to
| bypass validation of the certificate chain via a malformed SSL/TLS
| signature, a similar vulnerability to CVE-2008-5077.

Unlike the above CVE id description says it is DSA_do_verify 
being used.

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0025
    http://security-tracker.debian.net/tracker/CVE-2009-0025
and
https://www.isc.org/node/373

-- 
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgpCiwBJw9g0T.pgp
Description: PGP signature

Reply via email to