Cache poisoning attacks with unsolicited RRs
37136
03 March 2026
03 March 2026
CLOSED
MEDIUM
8.6
CVE-2025-40778
|
Brocade Security Advisory ID |
BSA-2026-3173 |
|
Component |
Bind |
|
|
|
Summary
Under certain circumstances, BIND is too lenient when accepting records from answers, allowing an attacker to inject forged data into the cache. This issue affects BIND 9 versions 9.11.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.11.3-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.
CWE-349: CWE-349 Acceptance of Extraneous Untrusted Data With Trusted Data
Products Affected
- Brocade SANnav base OS (OVA deployment) before 2.4.0b
- Brocade ASCG base OS (OVA deployment) before 3.4.0
Products Not Affected
- Brocade Fabric OS
[VEX Justification: Component_not_present] - Brocade SANnav
[VEX Justification: Component_not_present] - Brocade ASCG
[VEX Justification: Component_not_present]
Solution
- Solution provided in Brocade ASCG OVA version 3.4.0
- Solution provided in Brocade SANnav OVA versions 2.4.0b and 3.0.0
- SANnav base OS Security update also provided in the sannav_ova_8x_os OVA patch which can be applied to all SANnav OVA releases 2.3.0 through 2.4.0a
Revision History
|
Version |
Change |
Date |
|
1.0 |
Initial Publication |
March 3, 2026 |
Disclaimer
THIS DOCUMENT IS PROVIDED ON AN AS-IS BASIS SOLELY FOR INFORMATIONAL PURPOSES AND DOES NOT IMPLY ANY KIND OF GUARANTY OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. YOUR USE OF THE INFORMATION CONTAINED HEREIN IS AT YOUR OWN RISK. ALL INFORMATION PROVIDED HEREIN IS BASED ON BROCADE'S CURRENT KNOWLEDGE AND UNDERSTANDING OF THE VULNERABILITY AND IMPACT TO BROCADE HARDWARE AND SOFTWARE PRODUCTS. BROCADE RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.