Description
In BIND 9.10.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.10.5-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker that can reach a vulnerable system with a specially crafted query packet can trigger a crash. To be vulnerable, the system must: * be running BIND that was built with "--enable-native-pkcs11" * be signing one or more zones with an RSA key * be able to receive queries from a possible attacker
No analysis available yet.
Remediation
Vendor Solution
Upgrade to the patched release most closely related to your current version of BIND: BIND 9.11.22 BIND 9.16.6 BIND 9.17.4 BIND Supported Preview Edition is a special feature preview branch of BIND provided to eligible ISC support customers. BIND 9.11.22-S1
Vendor Workaround
No workarounds known.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2355-1 | bind9 security update |
Debian DSA |
DSA-4752-1 | bind9 security update |
EUVD |
EUVD-2020-29471 | In BIND 9.10.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.10.5-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker that can reach a vulnerable system with a specially crafted query packet can trigger a crash. To be vulnerable, the system must: * be running BIND that was built with "--enable-native-pkcs11" * be signing one or more zones with an RSA key * be able to receive queries from a possible attacker |
Ubuntu USN |
USN-4468-1 | Bind vulnerabilities |
References
History
No history.
Subscriptions
Canonical
Subscribe
Ubuntu Linux
Subscribe
Debian
Subscribe
Debian Linux
Subscribe
Fedoraproject
Subscribe
Fedora
Subscribe
Isc
Subscribe
Bind
Subscribe
Netapp
Subscribe
Steelstore Cloud Integrated Storage
Subscribe
Opensuse
Subscribe
Leap
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Rhel Eus
Subscribe
Synology
Subscribe
Dns Server
Subscribe
Status: PUBLISHED
Assigner: isc
Published:
Updated: 2024-09-17T03:19:11.433Z
Reserved: 2020-02-05T00:00:00.000Z
Link: CVE-2020-8623
No data.
Status : Modified
Published: 2020-08-21T21:15:12.327
Modified: 2024-11-21T05:39:08.767
Link: CVE-2020-8623
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN