CVE-2009-4022

N/A Unknown
Published: November 25, 2009 Modified: April 23, 2026
View on NVD

Description

Unspecified vulnerability in ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P4, 9.5 before 9.5.2-P1, 9.6 before 9.6.1-P2, and 9.7 beta before 9.7.0b3, with DNSSEC validation enabled and checking disabled (CD), allows remote attackers to conduct DNS cache poisoning attacks by receiving a recursive client query and sending a response that contains an Additional section with crafted data, which is not properly handled when the response is processed "at the same time as requesting DNSSEC records (DO)," aka Bug 20438.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://osvdb.org/60493
Source: secalert@redhat.com
http://secunia.com/advisories/37426
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/37491
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/38219
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/38240
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/38794
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/38834
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/39334
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/40730
Source: secalert@redhat.com
Vendor Advisory
http://support.apple.com/kb/HT5002
Source: secalert@redhat.com
http://www.kb.cert.org/vuls/id/418861
Source: secalert@redhat.com
US Government Resource
http://www.redhat.com/support/errata/RHSA-2009-1620.html
Source: secalert@redhat.com
Vendor Advisory
http://www.securityfocus.com/bid/37118
Source: secalert@redhat.com
http://www.ubuntu.com/usn/USN-888-1
Source: secalert@redhat.com
http://www.vupen.com/english/advisories/2009/3335
Source: secalert@redhat.com
Vendor Advisory
http://www.vupen.com/english/advisories/2010/0176
Source: secalert@redhat.com
Vendor Advisory
http://www.vupen.com/english/advisories/2010/0528
Source: secalert@redhat.com
Vendor Advisory
http://www.vupen.com/english/advisories/2010/0622
Source: secalert@redhat.com
Vendor Advisory
https://issues.rpath.com/browse/RPL-3152
Source: secalert@redhat.com
https://www.isc.org/advisories/CVE-2009-4022v6
Source: secalert@redhat.com
Vendor Advisory
https://www.isc.org/advisories/CVE2009-4022
Source: secalert@redhat.com
Vendor Advisory
http://osvdb.org/60493
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/37426
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/37491
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/38219
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/38240
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/38794
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/38834
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/39334
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/40730
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://support.apple.com/kb/HT5002
Source: af854a3a-2127-422b-91ae-364da2661108
http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ibm.com/support/docview.wss?uid=isg1IZ68597
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ibm.com/support/docview.wss?uid=isg1IZ71667
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ibm.com/support/docview.wss?uid=isg1IZ71774
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.kb.cert.org/vuls/id/418861
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.mandriva.com/security/advisories?name=MDVSA-2009:304
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2009/11/24/1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2009/11/24/2
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2009/11/24/8
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2009-1620.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.securityfocus.com/bid/37118
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/USN-888-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2009/3335
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2010/0176
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2010/0528
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2010/0622
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=538744
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/54416
Source: af854a3a-2127-422b-91ae-364da2661108
https://issues.rpath.com/browse/RPL-3152
Source: af854a3a-2127-422b-91ae-364da2661108
https://www.isc.org/advisories/CVE-2009-4022v6
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://www.isc.org/advisories/CVE2009-4022
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory

88 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
20.0%
95th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

isc