Количество 15
Количество 15
CVE-2020-8616
A malicious actor who intentionally exploits this lack of effective limitation on the number of fetches performed when processing referrals can, through the use of specially crafted referrals, cause a recursing server to issue a very large number of fetches in an attempt to process the referral. This has at least two potential effects: The performance of the recursing server can potentially be degraded by the additional work required to perform these fetches, and The attacker can exploit this behavior to use the recursing server as a reflector in a reflection attack with a high amplification factor.
CVE-2020-8616
A malicious actor who intentionally exploits this lack of effective limitation on the number of fetches performed when processing referrals can, through the use of specially crafted referrals, cause a recursing server to issue a very large number of fetches in an attempt to process the referral. This has at least two potential effects: The performance of the recursing server can potentially be degraded by the additional work required to perform these fetches, and The attacker can exploit this behavior to use the recursing server as a reflector in a reflection attack with a high amplification factor.
CVE-2020-8616
A malicious actor who intentionally exploits this lack of effective limitation on the number of fetches performed when processing referrals can, through the use of specially crafted referrals, cause a recursing server to issue a very large number of fetches in an attempt to process the referral. This has at least two potential effects: The performance of the recursing server can potentially be degraded by the additional work required to perform these fetches, and The attacker can exploit this behavior to use the recursing server as a reflector in a reflection attack with a high amplification factor.
CVE-2020-8616
A malicious actor who intentionally exploits this lack of effective li ...
GHSA-rc96-hg8v-6p4g
A malicious actor who intentionally exploits this lack of effective limitation on the number of fetches performed when processing referrals can, through the use of specially crafted referrals, cause a recursing server to issue a very large number of fetches in an attempt to process the referral. This has at least two potential effects: The performance of the recursing server can potentially be degraded by the additional work required to perform these fetches, and The attacker can exploit this behavior to use the recursing server as a reflector in a reflection attack with a high amplification factor.
BDU:2020-03950
Уязвимость DNS-сервера BIND, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
SUSE-SU-2020:1350-1
Security update for bind
ELSA-2020-2383
ELSA-2020-2383: bind security update (IMPORTANT)
ELSA-2020-2344
ELSA-2020-2344: bind security update (IMPORTANT)
ELSA-2020-2338
ELSA-2020-2338: bind security update (IMPORTANT)
SUSE-SU-2020:1914-1
Security update for bind
SUSE-SU-2020:14400-1
Security update for bind
openSUSE-SU-2020:1701-1
Security update for bind
openSUSE-SU-2020:1699-1
Security update for bind
SUSE-SU-2020:2914-1
Security update for bind
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2020-8616 A malicious actor who intentionally exploits this lack of effective limitation on the number of fetches performed when processing referrals can, through the use of specially crafted referrals, cause a recursing server to issue a very large number of fetches in an attempt to process the referral. This has at least two potential effects: The performance of the recursing server can potentially be degraded by the additional work required to perform these fetches, and The attacker can exploit this behavior to use the recursing server as a reflector in a reflection attack with a high amplification factor. | CVSS3: 8.6 | 20% Средний | больше 5 лет назад | |
CVE-2020-8616 A malicious actor who intentionally exploits this lack of effective limitation on the number of fetches performed when processing referrals can, through the use of specially crafted referrals, cause a recursing server to issue a very large number of fetches in an attempt to process the referral. This has at least two potential effects: The performance of the recursing server can potentially be degraded by the additional work required to perform these fetches, and The attacker can exploit this behavior to use the recursing server as a reflector in a reflection attack with a high amplification factor. | CVSS3: 8.6 | 20% Средний | больше 5 лет назад | |
CVE-2020-8616 A malicious actor who intentionally exploits this lack of effective limitation on the number of fetches performed when processing referrals can, through the use of specially crafted referrals, cause a recursing server to issue a very large number of fetches in an attempt to process the referral. This has at least two potential effects: The performance of the recursing server can potentially be degraded by the additional work required to perform these fetches, and The attacker can exploit this behavior to use the recursing server as a reflector in a reflection attack with a high amplification factor. | CVSS3: 8.6 | 20% Средний | больше 5 лет назад | |
CVE-2020-8616 A malicious actor who intentionally exploits this lack of effective li ... | CVSS3: 8.6 | 20% Средний | больше 5 лет назад | |
GHSA-rc96-hg8v-6p4g A malicious actor who intentionally exploits this lack of effective limitation on the number of fetches performed when processing referrals can, through the use of specially crafted referrals, cause a recursing server to issue a very large number of fetches in an attempt to process the referral. This has at least two potential effects: The performance of the recursing server can potentially be degraded by the additional work required to perform these fetches, and The attacker can exploit this behavior to use the recursing server as a reflector in a reflection attack with a high amplification factor. | 20% Средний | больше 3 лет назад | ||
BDU:2020-03950 Уязвимость DNS-сервера BIND, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.3 | 20% Средний | больше 5 лет назад | |
SUSE-SU-2020:1350-1 Security update for bind | больше 5 лет назад | |||
ELSA-2020-2383 ELSA-2020-2383: bind security update (IMPORTANT) | больше 5 лет назад | |||
ELSA-2020-2344 ELSA-2020-2344: bind security update (IMPORTANT) | больше 5 лет назад | |||
ELSA-2020-2338 ELSA-2020-2338: bind security update (IMPORTANT) | больше 5 лет назад | |||
SUSE-SU-2020:1914-1 Security update for bind | больше 5 лет назад | |||
SUSE-SU-2020:14400-1 Security update for bind | больше 5 лет назад | |||
openSUSE-SU-2020:1701-1 Security update for bind | больше 5 лет назад | |||
openSUSE-SU-2020:1699-1 Security update for bind | больше 5 лет назад | |||
SUSE-SU-2020:2914-1 Security update for bind | больше 5 лет назад |
Уязвимостей на страницу