Description
In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker on the network path for a TSIG-signed request, or operating the server receiving the TSIG-signed request, could send a truncated response to that request, triggering an assertion failure, causing the server to exit. Alternately, an off-path attacker would have to correctly guess when a TSIG-signed request was sent, along with other characteristics of the packet and message, and spoof a truncated response to trigger an assertion failure, causing the server to exit.
No analysis available yet.
Remediation
Vendor Solution
Upgrade to the patched release most closely related to your current version of BIND: BIND 9.11.22 BIND 9.16.6 BIND 9.17.4 BIND Supported Preview Edition is a special feature preview branch of BIND provided to eligible ISC support customers. BIND 9.11.22-S1
Vendor Workaround
No workarounds known.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2355-1 | bind9 security update |
Debian DSA |
DSA-4752-1 | bind9 security update |
EUVD |
EUVD-2020-29470 | In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker on the network path for a TSIG-signed request, or operating the server receiving the TSIG-signed request, could send a truncated response to that request, triggering an assertion failure, causing the server to exit. Alternately, an off-path attacker would have to correctly guess when a TSIG-signed request was sent, along with other characteristics of the packet and message, and spoof a truncated response to trigger an assertion failure, causing the server to exit. |
Ubuntu USN |
USN-4468-1 | Bind vulnerabilities |
Ubuntu USN |
USN-4468-2 | Bind vulnerability |
References
History
No history.
Subscriptions
Canonical
Subscribe
Ubuntu Linux
Subscribe
Debian
Subscribe
Debian Linux
Subscribe
Fedoraproject
Subscribe
Fedora
Subscribe
Isc
Subscribe
Bind
Subscribe
Netapp
Subscribe
Steelstore Cloud Integrated Storage
Subscribe
Opensuse
Subscribe
Leap
Subscribe
Oracle
Subscribe
Communications Diameter Signaling Router
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Rhel Eus
Subscribe
Synology
Subscribe
Dns Server
Subscribe
Status: PUBLISHED
Assigner: isc
Published:
Updated: 2024-09-16T17:14:14.760Z
Reserved: 2020-02-05T00:00:00.000Z
Link: CVE-2020-8622
No data.
Status : Modified
Published: 2020-08-21T21:15:12.247
Modified: 2024-11-21T05:39:08.607
Link: CVE-2020-8622
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN