HIGH · 7.5

CVE-2020-8623

In BIND 9.10.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.10.5-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker that can reach a vulnerable system with a speci...

Vulnerability Description

In BIND 9.10.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.10.5-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker that can reach a vulnerable system with a specially crafted query packet can trigger a crash. To be vulnerable, the system must: * be running BIND that was built with "--enable-native-pkcs11" * be signing one or more zones with an RSA key * be able to receive queries from a possible attacker

CVSS Score

7.5

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH

Affected Products

VendorProductVersions
IscBind>= 9.10.0, <= 9.11.21
FedoraprojectFedora31
OpensuseLeap15.1
DebianDebian Linux9.0
CanonicalUbuntu Linux16.04
SynologyDns Server< 2.2.2-5027
NetappSteelstore Cloud Integrated Storage-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2020-8623?

CVE-2020-8623 is a vulnerability with a CVSS score of 7.5 (HIGH). In BIND 9.10.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.10.5-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker that can reach a vulnerable system with a speci...

How severe is CVE-2020-8623?

CVE-2020-8623 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2020-8623?

Check the references section above for vendor advisories and patch information. Affected products include: Isc Bind, Fedoraproject Fedora, Opensuse Leap, Debian Debian Linux, Canonical Ubuntu Linux.