CVE-2020-8621

In BIND 9.14.0 -> 9.16.5, 9.17.0 -> 9.17.3, If a server is configured with both QNAME minimization and 'forward first' then an attacker who can send queries to it may be able to trigger the condition that will cause the server to crash. Servers that 'forward only' are not affected.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*

Configuration 4 (hide)

cpe:2.3:a:synology:dns_server:*:*:*:*:*:*:*:*

Configuration 5 (hide)

cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:39

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html - Mailing List, Third Party Advisory
References () https://kb.isc.org/docs/cve-2020-8621 - Vendor Advisory () https://kb.isc.org/docs/cve-2020-8621 - Vendor Advisory
References () https://security.gentoo.org/glsa/202008-19 - Third Party Advisory () https://security.gentoo.org/glsa/202008-19 - Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20200827-0003/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20200827-0003/ - Third Party Advisory
References () https://usn.ubuntu.com/4468-1/ - Third Party Advisory () https://usn.ubuntu.com/4468-1/ - Third Party Advisory
References () https://www.synology.com/security/advisory/Synology_SA_20_19 - Third Party Advisory () https://www.synology.com/security/advisory/Synology_SA_20_19 - Third Party Advisory

28 Apr 2022, 18:27

Type Values Removed Values Added
CPE cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:a:synology:dns_server:*:*:*:*:*:*:*:*
cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
CWE CWE-20 CWE-617
References (UBUNTU) https://usn.ubuntu.com/4468-1/ - (UBUNTU) https://usn.ubuntu.com/4468-1/ - Third Party Advisory
References (CONFIRM) https://security.netapp.com/advisory/ntap-20200827-0003/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20200827-0003/ - Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html - Mailing List, Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html - Mailing List, Third Party Advisory
References (CONFIRM) https://www.synology.com/security/advisory/Synology_SA_20_19 - (CONFIRM) https://www.synology.com/security/advisory/Synology_SA_20_19 - Third Party Advisory
References (GENTOO) https://security.gentoo.org/glsa/202008-19 - (GENTOO) https://security.gentoo.org/glsa/202008-19 - Third Party Advisory

Information

Published : 2020-08-21 21:15

Updated : 2024-11-21 05:39


NVD link : CVE-2020-8621

Mitre link : CVE-2020-8621

CVE.ORG link : CVE-2020-8621


JSON object : View

Products Affected

netapp

  • steelstore_cloud_integrated_storage

opensuse

  • leap

canonical

  • ubuntu_linux

synology

  • dns_server

isc

  • bind
CWE
CWE-617

Reachable Assertion