Логотип exploitDog
bind:"CVE-2020-8624" OR bind:"CVE-2020-8623" OR bind:"CVE-2020-8622"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2020-8624" OR bind:"CVE-2020-8623" OR bind:"CVE-2020-8622"

Количество 29

Количество 29

suse-cvrf логотип

SUSE-RU-2020:2915-1

больше 5 лет назад

Recommended update for bind

EPSS: Низкий
oracle-oval логотип

ELSA-2020-5011

около 5 лет назад

ELSA-2020-5011: bind security and bug fix update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2020-4500

больше 5 лет назад

ELSA-2020-4500: bind security, bug fix, and enhancement update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:1701-1

больше 5 лет назад

Security update for bind

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:1699-1

больше 5 лет назад

Security update for bind

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:2914-1

больше 5 лет назад

Security update for bind

EPSS: Низкий
ubuntu логотип

CVE-2020-8624

больше 5 лет назад

In BIND 9.9.12 -> 9.9.13, 9.10.7 -> 9.10.8, 9.11.3 -> 9.11.21, 9.12.1 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.12-S1 -> 9.9.13-S1, 9.11.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker who has been granted privileges to change a specific subset of the zone's content could abuse these unintended additional privileges to update other contents of the zone.

CVSS3: 4.3
EPSS: Низкий
redhat логотип

CVE-2020-8624

больше 5 лет назад

In BIND 9.9.12 -> 9.9.13, 9.10.7 -> 9.10.8, 9.11.3 -> 9.11.21, 9.12.1 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.12-S1 -> 9.9.13-S1, 9.11.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker who has been granted privileges to change a specific subset of the zone's content could abuse these unintended additional privileges to update other contents of the zone.

CVSS3: 4.3
EPSS: Низкий
nvd логотип

CVE-2020-8624

больше 5 лет назад

In BIND 9.9.12 -> 9.9.13, 9.10.7 -> 9.10.8, 9.11.3 -> 9.11.21, 9.12.1 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.12-S1 -> 9.9.13-S1, 9.11.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker who has been granted privileges to change a specific subset of the zone's content could abuse these unintended additional privileges to update other contents of the zone.

CVSS3: 4.3
EPSS: Низкий
msrc логотип

CVE-2020-8624

больше 5 лет назад

update-policy rules of type "subdomain" are enforced incorrectly

CVSS3: 4.3
EPSS: Низкий
debian логотип

CVE-2020-8624

больше 5 лет назад

In BIND 9.9.12 -> 9.9.13, 9.10.7 -> 9.10.8, 9.11.3 -> 9.11.21, 9.12.1 ...

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-qgv6-6x66-mr9j

больше 3 лет назад

In BIND 9.9.12 -> 9.9.13, 9.10.7 -> 9.10.8, 9.11.3 -> 9.11.21, 9.12.1 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.12-S1 -> 9.9.13-S1, 9.11.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker who has been granted privileges to change a specific subset of the zone's content could abuse these unintended additional privileges to update other contents of the zone.

CVSS3: 4.3
EPSS: Низкий
fstec логотип

BDU:2021-01726

больше 5 лет назад

Уязвимость пакета DNS-сервера Bind9, связанная с ошибками при обработке правил «update-policy» типа «subdomain», позволяющая нарушителю обновлять все части DNS-зоны вместе с тем поддоменом, обновление которого запланировано

CVSS3: 4.3
EPSS: Низкий
ubuntu логотип

CVE-2020-8623

больше 5 лет назад

In BIND 9.10.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.10.5-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker that can reach a vulnerable system with a specially crafted query packet can trigger a crash. To be vulnerable, the system must: * be running BIND that was built with "--enable-native-pkcs11" * be signing one or more zones with an RSA key * be able to receive queries from a possible attacker

CVSS3: 7.5
EPSS: Средний
redhat логотип

CVE-2020-8623

больше 5 лет назад

In BIND 9.10.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.10.5-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker that can reach a vulnerable system with a specially crafted query packet can trigger a crash. To be vulnerable, the system must: * be running BIND that was built with "--enable-native-pkcs11" * be signing one or more zones with an RSA key * be able to receive queries from a possible attacker

CVSS3: 7.5
EPSS: Средний
nvd логотип

CVE-2020-8623

больше 5 лет назад

In BIND 9.10.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.10.5-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker that can reach a vulnerable system with a specially crafted query packet can trigger a crash. To be vulnerable, the system must: * be running BIND that was built with "--enable-native-pkcs11" * be signing one or more zones with an RSA key * be able to receive queries from a possible attacker

CVSS3: 7.5
EPSS: Средний
msrc логотип

CVE-2020-8623

больше 5 лет назад

A flaw in native PKCS#11 code can lead to a remotely triggerable assertion failure in pk11.c

CVSS3: 7.5
EPSS: Средний
debian логотип

CVE-2020-8623

больше 5 лет назад

In BIND 9.10.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also af ...

CVSS3: 7.5
EPSS: Средний
ubuntu логотип

CVE-2020-8622

больше 5 лет назад

In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker on the network path for a TSIG-signed request, or operating the server receiving the TSIG-signed request, could send a truncated response to that request, triggering an assertion failure, causing the server to exit. Alternately, an off-path attacker would have to correctly guess when a TSIG-signed request was sent, along with other characteristics of the packet and message, and spoof a truncated response to trigger an assertion failure, causing the server to exit.

CVSS3: 6.5
EPSS: Низкий
redhat логотип

CVE-2020-8622

больше 5 лет назад

In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker on the network path for a TSIG-signed request, or operating the server receiving the TSIG-signed request, could send a truncated response to that request, triggering an assertion failure, causing the server to exit. Alternately, an off-path attacker would have to correctly guess when a TSIG-signed request was sent, along with other characteristics of the packet and message, and spoof a truncated response to trigger an assertion failure, causing the server to exit.

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
suse-cvrf логотип
SUSE-RU-2020:2915-1

Recommended update for bind

больше 5 лет назад
oracle-oval логотип
ELSA-2020-5011

ELSA-2020-5011: bind security and bug fix update (MODERATE)

около 5 лет назад
oracle-oval логотип
ELSA-2020-4500

ELSA-2020-4500: bind security, bug fix, and enhancement update (MODERATE)

больше 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:1701-1

Security update for bind

больше 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:1699-1

Security update for bind

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:2914-1

Security update for bind

больше 5 лет назад
ubuntu логотип
CVE-2020-8624

In BIND 9.9.12 -> 9.9.13, 9.10.7 -> 9.10.8, 9.11.3 -> 9.11.21, 9.12.1 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.12-S1 -> 9.9.13-S1, 9.11.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker who has been granted privileges to change a specific subset of the zone's content could abuse these unintended additional privileges to update other contents of the zone.

CVSS3: 4.3
2%
Низкий
больше 5 лет назад
redhat логотип
CVE-2020-8624

In BIND 9.9.12 -> 9.9.13, 9.10.7 -> 9.10.8, 9.11.3 -> 9.11.21, 9.12.1 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.12-S1 -> 9.9.13-S1, 9.11.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker who has been granted privileges to change a specific subset of the zone's content could abuse these unintended additional privileges to update other contents of the zone.

CVSS3: 4.3
2%
Низкий
больше 5 лет назад
nvd логотип
CVE-2020-8624

In BIND 9.9.12 -> 9.9.13, 9.10.7 -> 9.10.8, 9.11.3 -> 9.11.21, 9.12.1 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.12-S1 -> 9.9.13-S1, 9.11.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker who has been granted privileges to change a specific subset of the zone's content could abuse these unintended additional privileges to update other contents of the zone.

CVSS3: 4.3
2%
Низкий
больше 5 лет назад
msrc логотип
CVE-2020-8624

update-policy rules of type "subdomain" are enforced incorrectly

CVSS3: 4.3
2%
Низкий
больше 5 лет назад
debian логотип
CVE-2020-8624

In BIND 9.9.12 -> 9.9.13, 9.10.7 -> 9.10.8, 9.11.3 -> 9.11.21, 9.12.1 ...

CVSS3: 4.3
2%
Низкий
больше 5 лет назад
github логотип
GHSA-qgv6-6x66-mr9j

In BIND 9.9.12 -> 9.9.13, 9.10.7 -> 9.10.8, 9.11.3 -> 9.11.21, 9.12.1 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.12-S1 -> 9.9.13-S1, 9.11.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker who has been granted privileges to change a specific subset of the zone's content could abuse these unintended additional privileges to update other contents of the zone.

CVSS3: 4.3
2%
Низкий
больше 3 лет назад
fstec логотип
BDU:2021-01726

Уязвимость пакета DNS-сервера Bind9, связанная с ошибками при обработке правил «update-policy» типа «subdomain», позволяющая нарушителю обновлять все части DNS-зоны вместе с тем поддоменом, обновление которого запланировано

CVSS3: 4.3
2%
Низкий
больше 5 лет назад
ubuntu логотип
CVE-2020-8623

In BIND 9.10.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.10.5-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker that can reach a vulnerable system with a specially crafted query packet can trigger a crash. To be vulnerable, the system must: * be running BIND that was built with "--enable-native-pkcs11" * be signing one or more zones with an RSA key * be able to receive queries from a possible attacker

CVSS3: 7.5
18%
Средний
больше 5 лет назад
redhat логотип
CVE-2020-8623

In BIND 9.10.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.10.5-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker that can reach a vulnerable system with a specially crafted query packet can trigger a crash. To be vulnerable, the system must: * be running BIND that was built with "--enable-native-pkcs11" * be signing one or more zones with an RSA key * be able to receive queries from a possible attacker

CVSS3: 7.5
18%
Средний
больше 5 лет назад
nvd логотип
CVE-2020-8623

In BIND 9.10.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.10.5-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker that can reach a vulnerable system with a specially crafted query packet can trigger a crash. To be vulnerable, the system must: * be running BIND that was built with "--enable-native-pkcs11" * be signing one or more zones with an RSA key * be able to receive queries from a possible attacker

CVSS3: 7.5
18%
Средний
больше 5 лет назад
msrc логотип
CVE-2020-8623

A flaw in native PKCS#11 code can lead to a remotely triggerable assertion failure in pk11.c

CVSS3: 7.5
18%
Средний
больше 5 лет назад
debian логотип
CVE-2020-8623

In BIND 9.10.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also af ...

CVSS3: 7.5
18%
Средний
больше 5 лет назад
ubuntu логотип
CVE-2020-8622

In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker on the network path for a TSIG-signed request, or operating the server receiving the TSIG-signed request, could send a truncated response to that request, triggering an assertion failure, causing the server to exit. Alternately, an off-path attacker would have to correctly guess when a TSIG-signed request was sent, along with other characteristics of the packet and message, and spoof a truncated response to trigger an assertion failure, causing the server to exit.

CVSS3: 6.5
2%
Низкий
больше 5 лет назад
redhat логотип
CVE-2020-8622

In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker on the network path for a TSIG-signed request, or operating the server receiving the TSIG-signed request, could send a truncated response to that request, triggering an assertion failure, causing the server to exit. Alternately, an off-path attacker would have to correctly guess when a TSIG-signed request was sent, along with other characteristics of the packet and message, and spoof a truncated response to trigger an assertion failure, causing the server to exit.

CVSS3: 6.5
2%
Низкий
больше 5 лет назад

Уязвимостей на страницу