CVE-2020-8620
Name
CVE-2020-8620
Description
In BIND 9.15.6 -> 9.16.5, 9.17.0 -> 9.17.3, An attacker who can establish a TCP connection with the server and send data on that connection can exploit this to trigger the assertion failure, causing the server to exit.
NVD Severity
medium
Other trackers
CVE
,
NVD
,
CERT
,
CVE Details
,
CIRCL
,
Arch Linux
,
Debian
,
Red Hat
,
Ubuntu
,
Gentoo
,
SUSE (Bugzilla)
,
SUSE (CVE)
,
Mageia
Mailing lists
oss-security
,
full-disclosure
,
bugtraq
Exploits
Exploit DB
,
Metasploit
Forges
GitHub (
code
,
issues
), Aports (
code
,
issues
)
References
Type
URI
Vendor Advisory
https://kb.isc.org/docs/cve-2020-8620
CONFIRM
https://security.netapp.com/advisory/ntap-20200827-0003/
UBUNTU
https://usn.ubuntu.com/4468-1/
GENTOO
https://security.gentoo.org/glsa/202008-19
CONFIRM
https://www.synology.com/security/advisory/Synology_SA_20_19
SUSE
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html
SUSE
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html
Match rules
CPE URI
Source package
Min version
Max version
cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
bind
>= 9.15.6
<= 9.16.5
cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
bind
>= 9.17.0
<= 9.17.3
Vulnerable and fixed packages
Source package
Branch
Version
Maintainer
Status