Логотип exploitDog
bind:CVE-2020-8617
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-8617

Количество 15

Количество 15

ubuntu логотип

CVE-2020-8617

больше 5 лет назад

Using a specially-crafted message, an attacker may potentially cause a BIND server to reach an inconsistent state if the attacker knows (or successfully guesses) the name of a TSIG key used by the server. Since BIND, by default, configures a local session key even on servers whose configuration does not otherwise make use of it, almost all current BIND servers are vulnerable. In releases of BIND dating from March 2018 and after, an assertion check in tsig.c detects this inconsistent state and deliberately exits. Prior to the introduction of the check the server would continue operating in an inconsistent state, with potentially harmful results.

CVSS3: 7.5
EPSS: Критический
redhat логотип

CVE-2020-8617

больше 5 лет назад

Using a specially-crafted message, an attacker may potentially cause a BIND server to reach an inconsistent state if the attacker knows (or successfully guesses) the name of a TSIG key used by the server. Since BIND, by default, configures a local session key even on servers whose configuration does not otherwise make use of it, almost all current BIND servers are vulnerable. In releases of BIND dating from March 2018 and after, an assertion check in tsig.c detects this inconsistent state and deliberately exits. Prior to the introduction of the check the server would continue operating in an inconsistent state, with potentially harmful results.

CVSS3: 7.5
EPSS: Критический
nvd логотип

CVE-2020-8617

больше 5 лет назад

Using a specially-crafted message, an attacker may potentially cause a BIND server to reach an inconsistent state if the attacker knows (or successfully guesses) the name of a TSIG key used by the server. Since BIND, by default, configures a local session key even on servers whose configuration does not otherwise make use of it, almost all current BIND servers are vulnerable. In releases of BIND dating from March 2018 and after, an assertion check in tsig.c detects this inconsistent state and deliberately exits. Prior to the introduction of the check the server would continue operating in an inconsistent state, with potentially harmful results.

CVSS3: 7.5
EPSS: Критический
debian логотип

CVE-2020-8617

больше 5 лет назад

Using a specially-crafted message, an attacker may potentially cause a ...

CVSS3: 7.5
EPSS: Критический
github логотип

GHSA-q6g5-8p95-hqh7

больше 3 лет назад

Using a specially-crafted message, an attacker may potentially cause a BIND server to reach an inconsistent state if the attacker knows (or successfully guesses) the name of a TSIG key used by the server. Since BIND, by default, configures a local session key even on servers whose configuration does not otherwise make use of it, almost all current BIND servers are vulnerable. In releases of BIND dating from March 2018 and after, an assertion check in tsig.c detects this inconsistent state and deliberately exits. Prior to the introduction of the check the server would continue operating in an inconsistent state, with potentially harmful results.

CVSS3: 5.9
EPSS: Критический
fstec логотип

BDU:2021-00125

больше 5 лет назад

Уязвимость компонента tsig.c DNS-сервера BIND, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.3
EPSS: Критический
suse-cvrf логотип

SUSE-SU-2020:1350-1

больше 5 лет назад

Security update for bind

EPSS: Низкий
oracle-oval логотип

ELSA-2020-2383

больше 5 лет назад

ELSA-2020-2383: bind security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2020-2344

больше 5 лет назад

ELSA-2020-2344: bind security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2020-2338

больше 5 лет назад

ELSA-2020-2338: bind security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:1914-1

больше 5 лет назад

Security update for bind

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:14400-1

больше 5 лет назад

Security update for bind

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:1701-1

больше 5 лет назад

Security update for bind

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:1699-1

больше 5 лет назад

Security update for bind

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:2914-1

больше 5 лет назад

Security update for bind

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2020-8617

Using a specially-crafted message, an attacker may potentially cause a BIND server to reach an inconsistent state if the attacker knows (or successfully guesses) the name of a TSIG key used by the server. Since BIND, by default, configures a local session key even on servers whose configuration does not otherwise make use of it, almost all current BIND servers are vulnerable. In releases of BIND dating from March 2018 and after, an assertion check in tsig.c detects this inconsistent state and deliberately exits. Prior to the introduction of the check the server would continue operating in an inconsistent state, with potentially harmful results.

CVSS3: 7.5
93%
Критический
больше 5 лет назад
redhat логотип
CVE-2020-8617

Using a specially-crafted message, an attacker may potentially cause a BIND server to reach an inconsistent state if the attacker knows (or successfully guesses) the name of a TSIG key used by the server. Since BIND, by default, configures a local session key even on servers whose configuration does not otherwise make use of it, almost all current BIND servers are vulnerable. In releases of BIND dating from March 2018 and after, an assertion check in tsig.c detects this inconsistent state and deliberately exits. Prior to the introduction of the check the server would continue operating in an inconsistent state, with potentially harmful results.

CVSS3: 7.5
93%
Критический
больше 5 лет назад
nvd логотип
CVE-2020-8617

Using a specially-crafted message, an attacker may potentially cause a BIND server to reach an inconsistent state if the attacker knows (or successfully guesses) the name of a TSIG key used by the server. Since BIND, by default, configures a local session key even on servers whose configuration does not otherwise make use of it, almost all current BIND servers are vulnerable. In releases of BIND dating from March 2018 and after, an assertion check in tsig.c detects this inconsistent state and deliberately exits. Prior to the introduction of the check the server would continue operating in an inconsistent state, with potentially harmful results.

CVSS3: 7.5
93%
Критический
больше 5 лет назад
debian логотип
CVE-2020-8617

Using a specially-crafted message, an attacker may potentially cause a ...

CVSS3: 7.5
93%
Критический
больше 5 лет назад
github логотип
GHSA-q6g5-8p95-hqh7

Using a specially-crafted message, an attacker may potentially cause a BIND server to reach an inconsistent state if the attacker knows (or successfully guesses) the name of a TSIG key used by the server. Since BIND, by default, configures a local session key even on servers whose configuration does not otherwise make use of it, almost all current BIND servers are vulnerable. In releases of BIND dating from March 2018 and after, an assertion check in tsig.c detects this inconsistent state and deliberately exits. Prior to the introduction of the check the server would continue operating in an inconsistent state, with potentially harmful results.

CVSS3: 5.9
93%
Критический
больше 3 лет назад
fstec логотип
BDU:2021-00125

Уязвимость компонента tsig.c DNS-сервера BIND, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.3
93%
Критический
больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:1350-1

Security update for bind

больше 5 лет назад
oracle-oval логотип
ELSA-2020-2383

ELSA-2020-2383: bind security update (IMPORTANT)

больше 5 лет назад
oracle-oval логотип
ELSA-2020-2344

ELSA-2020-2344: bind security update (IMPORTANT)

больше 5 лет назад
oracle-oval логотип
ELSA-2020-2338

ELSA-2020-2338: bind security update (IMPORTANT)

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:1914-1

Security update for bind

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:14400-1

Security update for bind

больше 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:1701-1

Security update for bind

больше 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:1699-1

Security update for bind

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:2914-1

Security update for bind

больше 5 лет назад

Уязвимостей на страницу