First published: Tue May 19 2020(Updated: )
Lior Shafir, Yehuda Afek, and Anat Bremler-Barr discovered that Bind incorrectly limited certain fetches. A remote attacker could possibly use this issue to cause Bind to consume resources, leading to a denial of service, or possibly use Bind to perform a reflection attack. (CVE-2020-8616) Tobias Klein discovered that Bind incorrectly handled checking TSIG validity. A remote attacker could use this issue to cause Bind to crash, resulting in a denial of service, or possibly perform other attacks. (CVE-2020-8617)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/bind9 | <1:9.16.1-0ubuntu2.1 | 1:9.16.1-0ubuntu2.1 |
=20.04 | ||
All of | ||
ubuntu/bind9 | <1:9.11.5.P4+dfsg-5.1ubuntu2.2 | 1:9.11.5.P4+dfsg-5.1ubuntu2.2 |
=19.10 | ||
All of | ||
ubuntu/bind9 | <1:9.11.3+dfsg-1ubuntu1.12 | 1:9.11.3+dfsg-1ubuntu1.12 |
=18.04 | ||
All of | ||
ubuntu/bind9 | <1:9.10.3.dfsg.P4-8ubuntu1.16 | 1:9.10.3.dfsg.P4-8ubuntu1.16 |
=16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-8616 is not mentioned in the vulnerability report.
A remote attacker can exploit CVE-2020-8616 by causing Bind to consume resources or performing a reflection attack.
Versions 1:9.16.1-0ubuntu2.1, 1:9.11.5.P4+dfsg-5.1ubuntu2.2, 1:9.11.3+dfsg-1ubuntu1.12, and 1:9.10.3.dfsg.P4-8ubuntu1.16 are affected by this vulnerability.
To fix CVE-2020-8616, update to the specified remedy versions for the affected Bind packages.
You can find more information about USN-4365-1 on the Ubuntu security notice page.