CVE-2020-8621

In BIND 9.14.0 -> 9.16.5, 9.17.0 -> 9.17.3, If a server is configured with both QNAME minimization and 'forward first' then an attacker who can send queries to it may be able to trigger the condition that will cause the server to crash. Servers that 'forward only' are not affected.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*

Configuration 4 (hide)

cpe:2.3:a:synology:dns_server:*:*:*:*:*:*:*:*

Configuration 5 (hide)

cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:39

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html - Mailing List, Third Party Advisory
References () https://kb.isc.org/docs/cve-2020-8621 - Vendor Advisory () https://kb.isc.org/docs/cve-2020-8621 - Vendor Advisory
References () https://security.gentoo.org/glsa/202008-19 - Third Party Advisory () https://security.gentoo.org/glsa/202008-19 - Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20200827-0003/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20200827-0003/ - Third Party Advisory
References () https://usn.ubuntu.com/4468-1/ - Third Party Advisory () https://usn.ubuntu.com/4468-1/ - Third Party Advisory
References () https://www.synology.com/security/advisory/Synology_SA_20_19 - Third Party Advisory () https://www.synology.com/security/advisory/Synology_SA_20_19 - Third Party Advisory

28 Apr 2022, 18:27

Type Values Removed Values Added
CWE CWE-20 CWE-617
References (UBUNTU) https://usn.ubuntu.com/4468-1/ - (UBUNTU) https://usn.ubuntu.com/4468-1/ - Third Party Advisory
References (CONFIRM) https://security.netapp.com/advisory/ntap-20200827-0003/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20200827-0003/ - Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html - Mailing List, Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html - Mailing List, Third Party Advisory
References (CONFIRM) https://www.synology.com/security/advisory/Synology_SA_20_19 - (CONFIRM) https://www.synology.com/security/advisory/Synology_SA_20_19 - Third Party Advisory
References (GENTOO) https://security.gentoo.org/glsa/202008-19 - (GENTOO) https://security.gentoo.org/glsa/202008-19 - Third Party Advisory
CPE cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:a:synology:dns_server:*:*:*:*:*:*:*:*
cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*

Information

Published : 2020-08-21 21:15

Updated : 2024-11-21 05:39


NVD link : CVE-2020-8621

Mitre link : CVE-2020-8621

CVE.ORG link : CVE-2020-8621


JSON object : View

Products Affected

isc

  • bind

netapp

  • steelstore_cloud_integrated_storage

opensuse

  • leap

synology

  • dns_server

canonical

  • ubuntu_linux
CWE
CWE-617

Reachable Assertion