Description
In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker on the network path for a TSIG-signed request, or operating the server receiving the TSIG-signed request, could send a truncated response to that request, triggering an assertion failure, causing the server to exit. Alternately, an off-path attacker would have to correctly guess when a TSIG-signed request was sent, along with other characteristics of the packet and message, and spoof a truncated response to trigger an assertion failure, causing the server to exit.
Published: 2020-08-21
Score: 6.5 Medium
EPSS: 2.6% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Upgrade to the patched release most closely related to your current version of BIND: BIND 9.11.22 BIND 9.16.6 BIND 9.17.4 BIND Supported Preview Edition is a special feature preview branch of BIND provided to eligible ISC support customers. BIND 9.11.22-S1


Vendor Workaround

No workarounds known.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-2355-1 bind9 security update
Debian DSA Debian DSA DSA-4752-1 bind9 security update
EUVD EUVD EUVD-2020-29470 In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker on the network path for a TSIG-signed request, or operating the server receiving the TSIG-signed request, could send a truncated response to that request, triggering an assertion failure, causing the server to exit. Alternately, an off-path attacker would have to correctly guess when a TSIG-signed request was sent, along with other characteristics of the packet and message, and spoof a truncated response to trigger an assertion failure, causing the server to exit.
Ubuntu USN Ubuntu USN USN-4468-1 Bind vulnerabilities
Ubuntu USN Ubuntu USN USN-4468-2 Bind vulnerability
History

No history.

Subscriptions

Canonical Ubuntu Linux
Debian Debian Linux
Fedoraproject Fedora
Isc Bind
Netapp Steelstore Cloud Integrated Storage
Opensuse Leap
Oracle Communications Diameter Signaling Router
Redhat Enterprise Linux Rhel Eus
Synology Dns Server
cve-icon MITRE

Status: PUBLISHED

Assigner: isc

Published:

Updated: 2024-09-16T17:14:14.760Z

Reserved: 2020-02-05T00:00:00.000Z

Link: CVE-2020-8622

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-08-21T21:15:12.247

Modified: 2024-11-21T05:39:08.607

Link: CVE-2020-8622

cve-icon Redhat

Severity : Moderate

Publid Date: 2020-08-20T00:00:00Z

Links: CVE-2020-8622 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses