CVE-2020-8622

In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker on the network path for a TSIG-signed request, or operating the server receiving the TSIG-signed request, could send a truncated response to that request, triggering an assertion failure, causing the server to exit. Alternately, an off-path attacker would have to correctly guess when a TSIG-signed request was sent, along with other characteristics of the packet and message, and spoof a truncated response to trigger an assertion failure, causing the server to exit.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.5 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
iscCNA
6.5 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 62%
VendorProductVersion
iscbind
9.0.0 ≤
𝑥
≤ 9.11.21
iscbind
9.12.0 ≤
𝑥
≤ 9.16.5
iscbind
9.17.0 ≤
𝑥
≤ 9.17.3
iscbind
9.9.3:s1
iscbind
9.11.21:s1
debiandebian_linux
9.0
debiandebian_linux
10.0
canonicalubuntu_linux
12.04
canonicalubuntu_linux
14.04
canonicalubuntu_linux
16.04
canonicalubuntu_linux
18.04
canonicalubuntu_linux
20.04
netappsteelstore_cloud_integrated_storage
-
opensuseleap
15.1
opensuseleap
15.2
synologydns_server
𝑥
< 2.2.2-5028
oraclecommunications_diameter_signaling_router
8.0.0 ≤
𝑥
≤ 8.5.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
bind9
bullseye
1:9.16.50-1~deb11u2
fixed
bullseye (security)
1:9.16.50-1~deb11u1
fixed
bookworm
1:9.18.28-1~deb12u2
fixed
bookworm (security)
1:9.18.28-1~deb12u2
fixed
sid
1:9.20.2-1
fixed
trixie
1:9.20.2-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
bind9
focal
Fixed 1:9.16.1-0ubuntu2.3
released
bionic
Fixed 1:9.11.3+dfsg-1ubuntu1.13
released
xenial
Fixed 1:9.10.3.dfsg.P4-8ubuntu1.17
released
trusty
Fixed 1:9.9.5.dfsg-3ubuntu0.19+esm3
released
References