Логотип exploitDog
bind:"CVE-2020-8624" OR bind:"CVE-2020-8623" OR bind:"CVE-2020-8622"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2020-8624" OR bind:"CVE-2020-8623" OR bind:"CVE-2020-8622"

Количество 29

Количество 29

nvd логотип

CVE-2020-8622

больше 5 лет назад

In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker on the network path for a TSIG-signed request, or operating the server receiving the TSIG-signed request, could send a truncated response to that request, triggering an assertion failure, causing the server to exit. Alternately, an off-path attacker would have to correctly guess when a TSIG-signed request was sent, along with other characteristics of the packet and message, and spoof a truncated response to trigger an assertion failure, causing the server to exit.

CVSS3: 6.5
EPSS: Низкий
msrc логотип

CVE-2020-8622

больше 5 лет назад

A truncated TSIG response can lead to an assertion failure

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2020-8622

больше 5 лет назад

In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also aff ...

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-3hh5-h95j-2cw7

больше 3 лет назад

In BIND 9.10.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.10.5-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker that can reach a vulnerable system with a specially crafted query packet can trigger a crash. To be vulnerable, the system must: * be running BIND that was built with "--enable-native-pkcs11" * be signing one or more zones with an RSA key * be able to receive queries from a possible attacker

CVSS3: 7.5
EPSS: Средний
fstec логотип

BDU:2021-01693

больше 5 лет назад

Уязвимость реализации сборки DNS-сервера с опцией «--enable-native-pkcs11» Bind9, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.3
EPSS: Средний
suse-cvrf логотип

SUSE-SU-2021:2876-1

больше 4 лет назад

Security update for bind

EPSS: Низкий
github логотип

GHSA-fh6r-7j2f-pmw4

больше 3 лет назад

In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker on the network path for a TSIG-signed request, or operating the server receiving the TSIG-signed request, could send a truncated response to that request, triggering an assertion failure, causing the server to exit. Alternately, an off-path attacker would have to correctly guess when a TSIG-signed request was sent, along with other characteristics of the packet and message, and spoof a truncated response to trigger an assertion failure, causing the server to exit.

CVSS3: 6.5
EPSS: Низкий
oracle-oval логотип

ELSA-2020-4183

больше 5 лет назад

ELSA-2020-4183: bind security update (MODERATE)

EPSS: Низкий
fstec логотип

BDU:2021-01725

больше 5 лет назад

Уязвимость пакета создающий DNS-сервер Bind9, связанная с недостатком использования функции assert(), позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-8622

In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker on the network path for a TSIG-signed request, or operating the server receiving the TSIG-signed request, could send a truncated response to that request, triggering an assertion failure, causing the server to exit. Alternately, an off-path attacker would have to correctly guess when a TSIG-signed request was sent, along with other characteristics of the packet and message, and spoof a truncated response to trigger an assertion failure, causing the server to exit.

CVSS3: 6.5
2%
Низкий
больше 5 лет назад
msrc логотип
CVE-2020-8622

A truncated TSIG response can lead to an assertion failure

CVSS3: 6.5
2%
Низкий
больше 5 лет назад
debian логотип
CVE-2020-8622

In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also aff ...

CVSS3: 6.5
2%
Низкий
больше 5 лет назад
github логотип
GHSA-3hh5-h95j-2cw7

In BIND 9.10.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.10.5-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker that can reach a vulnerable system with a specially crafted query packet can trigger a crash. To be vulnerable, the system must: * be running BIND that was built with "--enable-native-pkcs11" * be signing one or more zones with an RSA key * be able to receive queries from a possible attacker

CVSS3: 7.5
18%
Средний
больше 3 лет назад
fstec логотип
BDU:2021-01693

Уязвимость реализации сборки DNS-сервера с опцией «--enable-native-pkcs11» Bind9, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.3
18%
Средний
больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2021:2876-1

Security update for bind

2%
Низкий
больше 4 лет назад
github логотип
GHSA-fh6r-7j2f-pmw4

In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker on the network path for a TSIG-signed request, or operating the server receiving the TSIG-signed request, could send a truncated response to that request, triggering an assertion failure, causing the server to exit. Alternately, an off-path attacker would have to correctly guess when a TSIG-signed request was sent, along with other characteristics of the packet and message, and spoof a truncated response to trigger an assertion failure, causing the server to exit.

CVSS3: 6.5
2%
Низкий
больше 3 лет назад
oracle-oval логотип
ELSA-2020-4183

ELSA-2020-4183: bind security update (MODERATE)

больше 5 лет назад
fstec логотип
BDU:2021-01725

Уязвимость пакета создающий DNS-сервер Bind9, связанная с недостатком использования функции assert(), позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.3
2%
Низкий
больше 5 лет назад

Уязвимостей на страницу