First published: Thu Aug 20 2020(Updated: )
In BIND 9.10.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.10.5-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker that can reach a vulnerable system with a specially crafted query packet can trigger a crash. To be vulnerable, the system must: * be running BIND that was built with "--enable-native-pkcs11" * be signing one or more zones with an RSA key * be able to receive queries from a possible attacker
Credit: security-officer@isc.org security-officer@isc.org
Affected Software | Affected Version | How to fix |
---|---|---|
ISC BIND | >=9.10.0<=9.11.21 | |
ISC BIND | >=9.12.1<=9.16.5 | |
ISC BIND | >=9.17.0<=9.17.3 | |
ISC BIND | =9.10.5-s1 | |
ISC BIND | =9.11.21-s1 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 | |
openSUSE Leap | =15.1 | |
openSUSE Leap | =15.2 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =20.04 | |
Synology DNS Server | <2.2.2-5027 | |
Netapp Steelstore Cloud Integrated Storage | ||
debian/bind9 | 1:9.16.50-1~deb11u2 1:9.16.50-1~deb11u1 1:9.18.28-1~deb12u2 1:9.20.4-3 |
Upgrade to the patched release most closely related to your current version of BIND: BIND 9.11.22 BIND 9.16.6 BIND 9.17.4 BIND Supported Preview Edition is a special feature preview branch of BIND provided to eligible ISC support customers. BIND 9.11.22-S1
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-8623 is a vulnerability in BIND DNS software that allows an attacker to crash a vulnerable system with a specially crafted query packet.
BIND versions 9.10.0 to 9.11.21, 9.12.0 to 9.16.5, and 9.17.0 to 9.17.3 are affected by CVE-2020-8623.
An attacker can exploit the CVE-2020-8623 vulnerability by sending a specially crafted query packet to a vulnerable BIND DNS server.
CVE-2020-8623 has a severity score of 7.5 (High).
Yes, you can find references for CVE-2020-8623 at the following links: [Link 1](https://kb.isc.org/docs/cve-2020-8623), [Link 2](https://gitlab.isc.org/isc-projects/bind9/commit/ac3862a5da95bb07b6cf748b0958175687a9de1d), [Link 3](https://gitlab.isc.org/isc-projects/bind9/commit/8d807cc21655eaa6e6a08afafeec3682c0f3f2ab).