First published: Wed Jun 17 2020(Updated: )
In ISC BIND9 versions BIND 9.11.14 -> 9.11.19, BIND 9.14.9 -> 9.14.12, BIND 9.16.0 -> 9.16.3, BIND Supported Preview Edition 9.11.14-S1 -> 9.11.19-S1: Unless a nameserver is providing authoritative service for one or more zones and at least one zone contains an empty non-terminal entry containing an asterisk ("*") character, this defect cannot be encountered. A would-be attacker who is allowed to change zone content could theoretically introduce such a record in order to exploit this condition to cause denial of service, though we consider the use of this vector unlikely because any such attack would require a significant privilege level and be easily traceable.
Credit: security-officer@isc.org security-officer@isc.org
Affected Software | Affected Version | How to fix |
---|---|---|
ISC BIND | >=9.11.14<=9.11.19 | |
ISC BIND | >=9.11.14-s1<=9.11.19-s1 | |
ISC BIND | >=9.14.9<=9.14.12 | |
ISC BIND | >=9.16.0<=9.16.3 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 | |
openSUSE Leap | =15.1 | |
openSUSE Leap | =15.2 | |
Debian Debian Linux | =10.0 | |
Canonical Ubuntu Linux | =20.04 | |
Netapp Steelstore Cloud Integrated Storage | ||
debian/bind9 | 1:9.16.50-1~deb11u2 1:9.16.50-1~deb11u1 1:9.18.28-1~deb12u2 1:9.20.1-1 1:9.20.2-1 |
Upgrade to the patched release most closely related to your current version of BIND: BIND 9.11.20 BIND 9.16.4 BIND Supported Preview Edition is a special feature preview branch of BIND provided to eligible ISC support customers. BIND 9.11.20-S1
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-8619 is medium with a CVSS score of 4.9.
The affected software for CVE-2020-8619 includes ISC BIND versions 9.11.14 to 9.11.19, 9.14.9 to 9.14.12, 9.16.0 to 9.16.3, and BIND Supported Preview Edition 9.11.14-S1 to 9.11.19-S1.
To fix CVE-2020-8619, you should update ISC BIND to versions 9.11.20, 9.14.13, or 9.16.4 and ensure that you are using the latest stable release of BIND.
You can find more information about CVE-2020-8619 on the ISC Knowledge Base and the ISC BIND GitLab repository.
The Common Weakness Enumeration (CWE) for CVE-2020-8619 is CWE-404, which refers to improper resource shutdown or release.