Логотип exploitDog
bind:CVE-2020-8616
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-8616

Количество 15

Количество 15

ubuntu логотип

CVE-2020-8616

больше 5 лет назад

A malicious actor who intentionally exploits this lack of effective limitation on the number of fetches performed when processing referrals can, through the use of specially crafted referrals, cause a recursing server to issue a very large number of fetches in an attempt to process the referral. This has at least two potential effects: The performance of the recursing server can potentially be degraded by the additional work required to perform these fetches, and The attacker can exploit this behavior to use the recursing server as a reflector in a reflection attack with a high amplification factor.

CVSS3: 8.6
EPSS: Средний
redhat логотип

CVE-2020-8616

больше 5 лет назад

A malicious actor who intentionally exploits this lack of effective limitation on the number of fetches performed when processing referrals can, through the use of specially crafted referrals, cause a recursing server to issue a very large number of fetches in an attempt to process the referral. This has at least two potential effects: The performance of the recursing server can potentially be degraded by the additional work required to perform these fetches, and The attacker can exploit this behavior to use the recursing server as a reflector in a reflection attack with a high amplification factor.

CVSS3: 8.6
EPSS: Средний
nvd логотип

CVE-2020-8616

больше 5 лет назад

A malicious actor who intentionally exploits this lack of effective limitation on the number of fetches performed when processing referrals can, through the use of specially crafted referrals, cause a recursing server to issue a very large number of fetches in an attempt to process the referral. This has at least two potential effects: The performance of the recursing server can potentially be degraded by the additional work required to perform these fetches, and The attacker can exploit this behavior to use the recursing server as a reflector in a reflection attack with a high amplification factor.

CVSS3: 8.6
EPSS: Средний
debian логотип

CVE-2020-8616

больше 5 лет назад

A malicious actor who intentionally exploits this lack of effective li ...

CVSS3: 8.6
EPSS: Средний
github логотип

GHSA-rc96-hg8v-6p4g

больше 3 лет назад

A malicious actor who intentionally exploits this lack of effective limitation on the number of fetches performed when processing referrals can, through the use of specially crafted referrals, cause a recursing server to issue a very large number of fetches in an attempt to process the referral. This has at least two potential effects: The performance of the recursing server can potentially be degraded by the additional work required to perform these fetches, and The attacker can exploit this behavior to use the recursing server as a reflector in a reflection attack with a high amplification factor.

EPSS: Средний
fstec логотип

BDU:2020-03950

больше 5 лет назад

Уязвимость DNS-сервера BIND, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.3
EPSS: Средний
suse-cvrf логотип

SUSE-SU-2020:1350-1

больше 5 лет назад

Security update for bind

EPSS: Низкий
oracle-oval логотип

ELSA-2020-2383

больше 5 лет назад

ELSA-2020-2383: bind security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2020-2344

больше 5 лет назад

ELSA-2020-2344: bind security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2020-2338

больше 5 лет назад

ELSA-2020-2338: bind security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:1914-1

больше 5 лет назад

Security update for bind

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:14400-1

больше 5 лет назад

Security update for bind

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:1701-1

больше 5 лет назад

Security update for bind

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:1699-1

больше 5 лет назад

Security update for bind

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:2914-1

больше 5 лет назад

Security update for bind

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2020-8616

A malicious actor who intentionally exploits this lack of effective limitation on the number of fetches performed when processing referrals can, through the use of specially crafted referrals, cause a recursing server to issue a very large number of fetches in an attempt to process the referral. This has at least two potential effects: The performance of the recursing server can potentially be degraded by the additional work required to perform these fetches, and The attacker can exploit this behavior to use the recursing server as a reflector in a reflection attack with a high amplification factor.

CVSS3: 8.6
20%
Средний
больше 5 лет назад
redhat логотип
CVE-2020-8616

A malicious actor who intentionally exploits this lack of effective limitation on the number of fetches performed when processing referrals can, through the use of specially crafted referrals, cause a recursing server to issue a very large number of fetches in an attempt to process the referral. This has at least two potential effects: The performance of the recursing server can potentially be degraded by the additional work required to perform these fetches, and The attacker can exploit this behavior to use the recursing server as a reflector in a reflection attack with a high amplification factor.

CVSS3: 8.6
20%
Средний
больше 5 лет назад
nvd логотип
CVE-2020-8616

A malicious actor who intentionally exploits this lack of effective limitation on the number of fetches performed when processing referrals can, through the use of specially crafted referrals, cause a recursing server to issue a very large number of fetches in an attempt to process the referral. This has at least two potential effects: The performance of the recursing server can potentially be degraded by the additional work required to perform these fetches, and The attacker can exploit this behavior to use the recursing server as a reflector in a reflection attack with a high amplification factor.

CVSS3: 8.6
20%
Средний
больше 5 лет назад
debian логотип
CVE-2020-8616

A malicious actor who intentionally exploits this lack of effective li ...

CVSS3: 8.6
20%
Средний
больше 5 лет назад
github логотип
GHSA-rc96-hg8v-6p4g

A malicious actor who intentionally exploits this lack of effective limitation on the number of fetches performed when processing referrals can, through the use of specially crafted referrals, cause a recursing server to issue a very large number of fetches in an attempt to process the referral. This has at least two potential effects: The performance of the recursing server can potentially be degraded by the additional work required to perform these fetches, and The attacker can exploit this behavior to use the recursing server as a reflector in a reflection attack with a high amplification factor.

20%
Средний
больше 3 лет назад
fstec логотип
BDU:2020-03950

Уязвимость DNS-сервера BIND, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.3
20%
Средний
больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:1350-1

Security update for bind

больше 5 лет назад
oracle-oval логотип
ELSA-2020-2383

ELSA-2020-2383: bind security update (IMPORTANT)

больше 5 лет назад
oracle-oval логотип
ELSA-2020-2344

ELSA-2020-2344: bind security update (IMPORTANT)

больше 5 лет назад
oracle-oval логотип
ELSA-2020-2338

ELSA-2020-2338: bind security update (IMPORTANT)

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:1914-1

Security update for bind

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:14400-1

Security update for bind

больше 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:1701-1

Security update for bind

больше 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:1699-1

Security update for bind

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:2914-1

Security update for bind

больше 5 лет назад

Уязвимостей на страницу