First published: Fri Aug 21 2020(Updated: )
In BIND 9.15.6 -> 9.16.5, 9.17.0 -> 9.17.3, An attacker who can establish a TCP connection with the server and send data on that connection can exploit this to trigger the assertion failure, causing the server to exit.
Credit: security-officer@isc.org security-officer@isc.org
Affected Software | Affected Version | How to fix |
---|---|---|
ISC BIND | >=9.15.6<=9.16.5 | |
ISC BIND | >=9.17.0<=9.17.3 | |
ISC BIND | =9.9.12-s1 | |
ISC BIND | =9.9.13-s1 | |
ISC BIND | =9.11.3-s1 | |
ISC BIND | =9.11.21-s1 | |
openSUSE Leap | =15.1 | |
openSUSE Leap | =15.2 | |
Netapp Steelstore Cloud Integrated Storage | ||
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
debian/bind9 | 1:9.16.50-1~deb11u2 1:9.16.50-1~deb11u1 1:9.18.28-1~deb12u2 1:9.20.2-1 |
Upgrade to the patched release most closely related to your current version of BIND: BIND 9.16.6 BIND 9.17.4
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-8620 is a vulnerability in BIND, a DNS software, that allows an attacker who can establish a TCP connection with the server to trigger an assertion failure and cause the server to exit.
The severity of CVE-2020-8620 is high with a CVSS score of 7.5.
BIND versions 9.15.6 to 9.16.5 and 9.17.0 to 9.17.3 are affected by CVE-2020-8620.
An attacker who can establish a TCP connection with the vulnerable server can exploit CVE-2020-8620 by sending data on that connection to trigger the assertion failure.
Yes, you can find more information about CVE-2020-8620 in the following references: - http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html - http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html - https://kb.isc.org/docs/cve-2020-8620