7.5

CVE-2020-8617

Using a specially-crafted message, an attacker may potentially cause a BIND server to reach an inconsistent state if the attacker knows (or successfully guesses) the name of a TSIG key used by the server. Since BIND, by default, configures a local session key even on servers whose configuration does not otherwise make use of it, almost all current BIND servers are vulnerable. In releases of BIND dating from March 2018 and after, an assertion check in tsig.c detects this inconsistent state and deliberately exits. Prior to the introduction of the check the server would continue operating in an inconsistent state, with potentially harmful results.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
IscBind Version >= 9.0.0 <= 9.11.18
IscBind Version >= 9.12.0 <= 9.12.4
IscBind Version >= 9.13.0 <= 9.13.7
IscBind Version >= 9.14.0 <= 9.14.11
IscBind Version >= 9.15.0 <= 9.15.6
IscBind Version >= 9.16.0 <= 9.16.2
IscBind Version >= 9.17.0 <= 9.17.1
IscBind Version9.12.4 Updatep1
IscBind Version9.12.4 Updatep2
IscBind Version9.9.3 Updates1 SwEditionsupported_preview
IscBind Version9.10.5 Updates1 SwEditionsupported_preview
IscBind Version9.10.7 Updates1 SwEditionsupported_preview
IscBind Version9.11.3 Updates1 SwEditionsupported_preview
IscBind Version9.11.5 Updates3 SwEditionsupported_preview
IscBind Version9.11.5 Updates5 SwEditionsupported_preview
IscBind Version9.11.6 Updates1 SwEditionsupported_preview
IscBind Version9.11.7 Updates1 SwEditionsupported_preview
IscBind Version9.11.8 Updates1 SwEditionsupported_preview
DebianDebian Linux Version8.0
DebianDebian Linux Version9.0
DebianDebian Linux Version10.0
FedoraprojectFedora Version31
FedoraprojectFedora Version32
OpensuseLeap Version15.1
OpensuseLeap Version15.2
CanonicalUbuntu Linux Version12.04 SwEdition-
CanonicalUbuntu Linux Version14.04 SwEditionesm
CanonicalUbuntu Linux Version16.04 SwEditionesm
CanonicalUbuntu Linux Version18.04 SwEditionlts
CanonicalUbuntu Linux Version19.10
CanonicalUbuntu Linux Version20.04 SwEditionlts
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 92.63% 0.997
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 5.9 2.2 3.6
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
nvd@nist.gov 4.3 8.6 2.9
AV:N/AC:M/Au:N/C:N/I:N/A:P
security-officer@isc.org 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE-617 Reachable Assertion

The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary.