Description
In BIND 9.15.6 -> 9.16.5, 9.17.0 -> 9.17.3, An attacker who can establish a TCP connection with the server and send data on that connection can exploit this to trigger the assertion failure, causing the server to exit.
No analysis available yet.
Remediation
Vendor Solution
Upgrade to the patched release most closely related to your current version of BIND: BIND 9.16.6 BIND 9.17.4
Vendor Workaround
No workarounds known.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-29468 | In BIND 9.15.6 -> 9.16.5, 9.17.0 -> 9.17.3, An attacker who can establish a TCP connection with the server and send data on that connection can exploit this to trigger the assertion failure, causing the server to exit. |
Ubuntu USN |
USN-4468-1 | Bind vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: isc
Published:
Updated: 2024-09-17T01:40:34.573Z
Reserved: 2020-02-05T00:00:00.000Z
Link: CVE-2020-8620
No data.
Status : Modified
Published: 2020-08-21T21:15:12.090
Modified: 2024-11-21T05:39:08.367
Link: CVE-2020-8620
OpenCVE Enrichment
No data.
EUVD
Ubuntu USN