First published: Fri Aug 21 2020(Updated: )
In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker on the network path for a TSIG-signed request, or operating the server receiving the TSIG-signed request, could send a truncated response to that request, triggering an assertion failure, causing the server to exit. Alternately, an off-path attacker would have to correctly guess when a TSIG-signed request was sent, along with other characteristics of the packet and message, and spoof a truncated response to trigger an assertion failure, causing the server to exit.
Credit: security-officer@isc.org
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Cloud Pak for Security (CP4S) | <=1.7.2.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.7.1.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.7.0.0 | |
debian/bind9 | 1:9.16.50-1~deb11u2 1:9.16.50-1~deb11u3 1:9.18.28-1~deb12u2 1:9.18.33-1~deb12u2 1:9.20.4-4 1:9.20.5-1 | |
BIND 9 | >=9.0.0<=9.11.21 | |
BIND 9 | >=9.12.0<=9.16.5 | |
BIND 9 | >=9.17.0<=9.17.3 | |
BIND 9 | =9.9.3-s1 | |
BIND 9 | =9.11.21-s1 | |
Fedora | =31 | |
Fedora | =32 | |
Debian | =9.0 | |
Debian | =10.0 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =20.04 | |
NetApp SteelStore | ||
openSUSE | =15.1 | |
openSUSE | =15.2 | |
Synology DNS Server | <2.2.2-5028 | |
Oracle Communications Diameter Signaling Router | >=8.0.0<=8.5.0 |
Upgrade to the patched release most closely related to your current version of BIND: BIND 9.11.22 BIND 9.16.6 BIND 9.17.4 BIND Supported Preview Edition is a special feature preview branch of BIND provided to eligible ISC support customers. BIND 9.11.22-S1
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-8622 is medium.
CVE-2020-8622 affects ISC BIND versions 9.0.0 to 9.11.21, 9.12.0 to 9.16.5, and 9.17.0 to 9.17.3.
An attacker on the network path for a TSIG-signed request, or operating the server receiving the TSIG-signed request, could send a truncated response to that request, triggering a denial of service.
ISC BIND versions 9.0.0 to 9.11.21, 9.12.0 to 9.16.5, and 9.17.0 to 9.17.3 are affected by CVE-2020-8622.
You can find more information about CVE-2020-8622 in the references provided: [link1](http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html), [link2](http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html), [link3](https://kb.isc.org/docs/cve-2020-8622).