In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker on the network path for a TSIG-signed request, or operating the server receiving the TSIG-signed request, could send a truncated response to that request, triggering an assertion failure, causing the server to exit. Alternately, an off-path attacker would have to correctly guess when a TSIG-signed request was sent, along with other characteristics of the packet and message, and spoof a truncated response to trigger an assertion failure, causing the server to exit.

Project Subscriptions

Vendors Products
Canonical Subscribe
Ubuntu Linux Subscribe
Debian Linux Subscribe
Fedoraproject Subscribe
Steelstore Cloud Integrated Storage Subscribe
Opensuse Subscribe
Communications Diameter Signaling Router Subscribe
Enterprise Linux Subscribe
Rhel Eus Subscribe
Synology Subscribe
Dns Server Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-2355-1 bind9 security update
Debian DSA Debian DSA DSA-4752-1 bind9 security update
EUVD EUVD EUVD-2020-29470 In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker on the network path for a TSIG-signed request, or operating the server receiving the TSIG-signed request, could send a truncated response to that request, triggering an assertion failure, causing the server to exit. Alternately, an off-path attacker would have to correctly guess when a TSIG-signed request was sent, along with other characteristics of the packet and message, and spoof a truncated response to trigger an assertion failure, causing the server to exit.
Ubuntu USN Ubuntu USN USN-4468-1 Bind vulnerabilities
Ubuntu USN Ubuntu USN USN-4468-2 Bind vulnerability
Fixes

Solution

Upgrade to the patched release most closely related to your current version of BIND: BIND 9.11.22 BIND 9.16.6 BIND 9.17.4 BIND Supported Preview Edition is a special feature preview branch of BIND provided to eligible ISC support customers. BIND 9.11.22-S1


Workaround

No workarounds known.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: isc

Published:

Updated: 2024-09-16T17:14:14.760Z

Reserved: 2020-02-05T00:00:00

Link: CVE-2020-8622

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-08-21T21:15:12.247

Modified: 2024-11-21T05:39:08.607

Link: CVE-2020-8622

cve-icon Redhat

Severity : Moderate

Publid Date: 2020-08-20T00:00:00Z

Links: CVE-2020-8622 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses