Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-8616

Опубликовано: 19 мая 2020
Источник: ubuntu
Приоритет: medium
EPSS Средний
CVSS2: 5
CVSS3: 8.6

Описание

A malicious actor who intentionally exploits this lack of effective limitation on the number of fetches performed when processing referrals can, through the use of specially crafted referrals, cause a recursing server to issue a very large number of fetches in an attempt to process the referral. This has at least two potential effects: The performance of the recursing server can potentially be degraded by the additional work required to perform these fetches, and The attacker can exploit this behavior to use the recursing server as a reflector in a reflection attack with a high amplification factor.

РелизСтатусПримечание
bionic

released

1:9.11.3+dfsg-1ubuntu1.12
devel

released

1:9.16.1-0ubuntu3
eoan

released

1:9.11.5.P4+dfsg-5.1ubuntu2.2
esm-infra-legacy/trusty

released

1:9.9.5.dfsg-3ubuntu0.19+esm2
esm-infra/bionic

released

1:9.11.3+dfsg-1ubuntu1.12
esm-infra/focal

released

1:9.16.1-0ubuntu2.1
esm-infra/xenial

released

1:9.10.3.dfsg.P4-8ubuntu1.16
focal

released

1:9.16.1-0ubuntu2.1
precise/esm

not-affected

1:9.8.1.dfsg.P1-4ubuntu0.30
trusty

ignored

end of standard support

Показывать по

EPSS

Процентиль: 95%
0.19877
Средний

5 Medium

CVSS2

8.6 High

CVSS3

Связанные уязвимости

CVSS3: 8.6
redhat
больше 5 лет назад

A malicious actor who intentionally exploits this lack of effective limitation on the number of fetches performed when processing referrals can, through the use of specially crafted referrals, cause a recursing server to issue a very large number of fetches in an attempt to process the referral. This has at least two potential effects: The performance of the recursing server can potentially be degraded by the additional work required to perform these fetches, and The attacker can exploit this behavior to use the recursing server as a reflector in a reflection attack with a high amplification factor.

CVSS3: 8.6
nvd
больше 5 лет назад

A malicious actor who intentionally exploits this lack of effective limitation on the number of fetches performed when processing referrals can, through the use of specially crafted referrals, cause a recursing server to issue a very large number of fetches in an attempt to process the referral. This has at least two potential effects: The performance of the recursing server can potentially be degraded by the additional work required to perform these fetches, and The attacker can exploit this behavior to use the recursing server as a reflector in a reflection attack with a high amplification factor.

CVSS3: 8.6
debian
больше 5 лет назад

A malicious actor who intentionally exploits this lack of effective li ...

github
больше 3 лет назад

A malicious actor who intentionally exploits this lack of effective limitation on the number of fetches performed when processing referrals can, through the use of specially crafted referrals, cause a recursing server to issue a very large number of fetches in an attempt to process the referral. This has at least two potential effects: The performance of the recursing server can potentially be degraded by the additional work required to perform these fetches, and The attacker can exploit this behavior to use the recursing server as a reflector in a reflection attack with a high amplification factor.

CVSS3: 5.3
fstec
больше 5 лет назад

Уязвимость DNS-сервера BIND, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 95%
0.19877
Средний

5 Medium

CVSS2

8.6 High

CVSS3