Логотип exploitDog
bind:"CVE-2020-8616" OR bind:"CVE-2020-8617"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2020-8616" OR bind:"CVE-2020-8617"

Количество 21

Количество 21

suse-cvrf логотип

SUSE-SU-2020:1350-1

больше 5 лет назад

Security update for bind

EPSS: Низкий
oracle-oval логотип

ELSA-2020-2383

больше 5 лет назад

ELSA-2020-2383: bind security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2020-2344

больше 5 лет назад

ELSA-2020-2344: bind security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2020-2338

больше 5 лет назад

ELSA-2020-2338: bind security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:1914-1

больше 5 лет назад

Security update for bind

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:14400-1

больше 5 лет назад

Security update for bind

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:1701-1

больше 5 лет назад

Security update for bind

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:1699-1

больше 5 лет назад

Security update for bind

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:2914-1

больше 5 лет назад

Security update for bind

EPSS: Низкий
ubuntu логотип

CVE-2020-8617

больше 5 лет назад

Using a specially-crafted message, an attacker may potentially cause a BIND server to reach an inconsistent state if the attacker knows (or successfully guesses) the name of a TSIG key used by the server. Since BIND, by default, configures a local session key even on servers whose configuration does not otherwise make use of it, almost all current BIND servers are vulnerable. In releases of BIND dating from March 2018 and after, an assertion check in tsig.c detects this inconsistent state and deliberately exits. Prior to the introduction of the check the server would continue operating in an inconsistent state, with potentially harmful results.

CVSS3: 7.5
EPSS: Критический
redhat логотип

CVE-2020-8617

больше 5 лет назад

Using a specially-crafted message, an attacker may potentially cause a BIND server to reach an inconsistent state if the attacker knows (or successfully guesses) the name of a TSIG key used by the server. Since BIND, by default, configures a local session key even on servers whose configuration does not otherwise make use of it, almost all current BIND servers are vulnerable. In releases of BIND dating from March 2018 and after, an assertion check in tsig.c detects this inconsistent state and deliberately exits. Prior to the introduction of the check the server would continue operating in an inconsistent state, with potentially harmful results.

CVSS3: 7.5
EPSS: Критический
nvd логотип

CVE-2020-8617

больше 5 лет назад

Using a specially-crafted message, an attacker may potentially cause a BIND server to reach an inconsistent state if the attacker knows (or successfully guesses) the name of a TSIG key used by the server. Since BIND, by default, configures a local session key even on servers whose configuration does not otherwise make use of it, almost all current BIND servers are vulnerable. In releases of BIND dating from March 2018 and after, an assertion check in tsig.c detects this inconsistent state and deliberately exits. Prior to the introduction of the check the server would continue operating in an inconsistent state, with potentially harmful results.

CVSS3: 7.5
EPSS: Критический
debian логотип

CVE-2020-8617

больше 5 лет назад

Using a specially-crafted message, an attacker may potentially cause a ...

CVSS3: 7.5
EPSS: Критический
ubuntu логотип

CVE-2020-8616

больше 5 лет назад

A malicious actor who intentionally exploits this lack of effective limitation on the number of fetches performed when processing referrals can, through the use of specially crafted referrals, cause a recursing server to issue a very large number of fetches in an attempt to process the referral. This has at least two potential effects: The performance of the recursing server can potentially be degraded by the additional work required to perform these fetches, and The attacker can exploit this behavior to use the recursing server as a reflector in a reflection attack with a high amplification factor.

CVSS3: 8.6
EPSS: Средний
redhat логотип

CVE-2020-8616

больше 5 лет назад

A malicious actor who intentionally exploits this lack of effective limitation on the number of fetches performed when processing referrals can, through the use of specially crafted referrals, cause a recursing server to issue a very large number of fetches in an attempt to process the referral. This has at least two potential effects: The performance of the recursing server can potentially be degraded by the additional work required to perform these fetches, and The attacker can exploit this behavior to use the recursing server as a reflector in a reflection attack with a high amplification factor.

CVSS3: 8.6
EPSS: Средний
nvd логотип

CVE-2020-8616

больше 5 лет назад

A malicious actor who intentionally exploits this lack of effective limitation on the number of fetches performed when processing referrals can, through the use of specially crafted referrals, cause a recursing server to issue a very large number of fetches in an attempt to process the referral. This has at least two potential effects: The performance of the recursing server can potentially be degraded by the additional work required to perform these fetches, and The attacker can exploit this behavior to use the recursing server as a reflector in a reflection attack with a high amplification factor.

CVSS3: 8.6
EPSS: Средний
debian логотип

CVE-2020-8616

больше 5 лет назад

A malicious actor who intentionally exploits this lack of effective li ...

CVSS3: 8.6
EPSS: Средний
github логотип

GHSA-rc96-hg8v-6p4g

больше 3 лет назад

A malicious actor who intentionally exploits this lack of effective limitation on the number of fetches performed when processing referrals can, through the use of specially crafted referrals, cause a recursing server to issue a very large number of fetches in an attempt to process the referral. This has at least two potential effects: The performance of the recursing server can potentially be degraded by the additional work required to perform these fetches, and The attacker can exploit this behavior to use the recursing server as a reflector in a reflection attack with a high amplification factor.

EPSS: Средний
github логотип

GHSA-q6g5-8p95-hqh7

больше 3 лет назад

Using a specially-crafted message, an attacker may potentially cause a BIND server to reach an inconsistent state if the attacker knows (or successfully guesses) the name of a TSIG key used by the server. Since BIND, by default, configures a local session key even on servers whose configuration does not otherwise make use of it, almost all current BIND servers are vulnerable. In releases of BIND dating from March 2018 and after, an assertion check in tsig.c detects this inconsistent state and deliberately exits. Prior to the introduction of the check the server would continue operating in an inconsistent state, with potentially harmful results.

CVSS3: 5.9
EPSS: Критический
fstec логотип

BDU:2021-00125

больше 5 лет назад

Уязвимость компонента tsig.c DNS-сервера BIND, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.3
EPSS: Критический

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
suse-cvrf логотип
SUSE-SU-2020:1350-1

Security update for bind

больше 5 лет назад
oracle-oval логотип
ELSA-2020-2383

ELSA-2020-2383: bind security update (IMPORTANT)

больше 5 лет назад
oracle-oval логотип
ELSA-2020-2344

ELSA-2020-2344: bind security update (IMPORTANT)

больше 5 лет назад
oracle-oval логотип
ELSA-2020-2338

ELSA-2020-2338: bind security update (IMPORTANT)

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:1914-1

Security update for bind

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:14400-1

Security update for bind

больше 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:1701-1

Security update for bind

больше 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:1699-1

Security update for bind

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:2914-1

Security update for bind

больше 5 лет назад
ubuntu логотип
CVE-2020-8617

Using a specially-crafted message, an attacker may potentially cause a BIND server to reach an inconsistent state if the attacker knows (or successfully guesses) the name of a TSIG key used by the server. Since BIND, by default, configures a local session key even on servers whose configuration does not otherwise make use of it, almost all current BIND servers are vulnerable. In releases of BIND dating from March 2018 and after, an assertion check in tsig.c detects this inconsistent state and deliberately exits. Prior to the introduction of the check the server would continue operating in an inconsistent state, with potentially harmful results.

CVSS3: 7.5
93%
Критический
больше 5 лет назад
redhat логотип
CVE-2020-8617

Using a specially-crafted message, an attacker may potentially cause a BIND server to reach an inconsistent state if the attacker knows (or successfully guesses) the name of a TSIG key used by the server. Since BIND, by default, configures a local session key even on servers whose configuration does not otherwise make use of it, almost all current BIND servers are vulnerable. In releases of BIND dating from March 2018 and after, an assertion check in tsig.c detects this inconsistent state and deliberately exits. Prior to the introduction of the check the server would continue operating in an inconsistent state, with potentially harmful results.

CVSS3: 7.5
93%
Критический
больше 5 лет назад
nvd логотип
CVE-2020-8617

Using a specially-crafted message, an attacker may potentially cause a BIND server to reach an inconsistent state if the attacker knows (or successfully guesses) the name of a TSIG key used by the server. Since BIND, by default, configures a local session key even on servers whose configuration does not otherwise make use of it, almost all current BIND servers are vulnerable. In releases of BIND dating from March 2018 and after, an assertion check in tsig.c detects this inconsistent state and deliberately exits. Prior to the introduction of the check the server would continue operating in an inconsistent state, with potentially harmful results.

CVSS3: 7.5
93%
Критический
больше 5 лет назад
debian логотип
CVE-2020-8617

Using a specially-crafted message, an attacker may potentially cause a ...

CVSS3: 7.5
93%
Критический
больше 5 лет назад
ubuntu логотип
CVE-2020-8616

A malicious actor who intentionally exploits this lack of effective limitation on the number of fetches performed when processing referrals can, through the use of specially crafted referrals, cause a recursing server to issue a very large number of fetches in an attempt to process the referral. This has at least two potential effects: The performance of the recursing server can potentially be degraded by the additional work required to perform these fetches, and The attacker can exploit this behavior to use the recursing server as a reflector in a reflection attack with a high amplification factor.

CVSS3: 8.6
20%
Средний
больше 5 лет назад
redhat логотип
CVE-2020-8616

A malicious actor who intentionally exploits this lack of effective limitation on the number of fetches performed when processing referrals can, through the use of specially crafted referrals, cause a recursing server to issue a very large number of fetches in an attempt to process the referral. This has at least two potential effects: The performance of the recursing server can potentially be degraded by the additional work required to perform these fetches, and The attacker can exploit this behavior to use the recursing server as a reflector in a reflection attack with a high amplification factor.

CVSS3: 8.6
20%
Средний
больше 5 лет назад
nvd логотип
CVE-2020-8616

A malicious actor who intentionally exploits this lack of effective limitation on the number of fetches performed when processing referrals can, through the use of specially crafted referrals, cause a recursing server to issue a very large number of fetches in an attempt to process the referral. This has at least two potential effects: The performance of the recursing server can potentially be degraded by the additional work required to perform these fetches, and The attacker can exploit this behavior to use the recursing server as a reflector in a reflection attack with a high amplification factor.

CVSS3: 8.6
20%
Средний
больше 5 лет назад
debian логотип
CVE-2020-8616

A malicious actor who intentionally exploits this lack of effective li ...

CVSS3: 8.6
20%
Средний
больше 5 лет назад
github логотип
GHSA-rc96-hg8v-6p4g

A malicious actor who intentionally exploits this lack of effective limitation on the number of fetches performed when processing referrals can, through the use of specially crafted referrals, cause a recursing server to issue a very large number of fetches in an attempt to process the referral. This has at least two potential effects: The performance of the recursing server can potentially be degraded by the additional work required to perform these fetches, and The attacker can exploit this behavior to use the recursing server as a reflector in a reflection attack with a high amplification factor.

20%
Средний
больше 3 лет назад
github логотип
GHSA-q6g5-8p95-hqh7

Using a specially-crafted message, an attacker may potentially cause a BIND server to reach an inconsistent state if the attacker knows (or successfully guesses) the name of a TSIG key used by the server. Since BIND, by default, configures a local session key even on servers whose configuration does not otherwise make use of it, almost all current BIND servers are vulnerable. In releases of BIND dating from March 2018 and after, an assertion check in tsig.c detects this inconsistent state and deliberately exits. Prior to the introduction of the check the server would continue operating in an inconsistent state, with potentially harmful results.

CVSS3: 5.9
93%
Критический
больше 3 лет назад
fstec логотип
BDU:2021-00125

Уязвимость компонента tsig.c DNS-сервера BIND, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.3
93%
Критический
больше 5 лет назад

Уязвимостей на страницу