Executive Summary
Summary | |
---|---|
Title | bind9 security update |
Informations | |||
---|---|---|---|
Name | DSA-4689 | First vendor Publication | 2020-05-19 |
Vendor | Debian | Last vendor Modification | 2020-05-19 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H | |||
---|---|---|---|
Overall CVSS Score | 8.6 | ||
Base Score | 8.6 | Environmental Score | 8.6 |
impact SubScore | 4 | Temporal Score | 8.6 |
Exploitabality Sub Score | 3.9 | ||
Attack Vector | Network | Attack Complexity | Low |
Privileges Required | None | User Interaction | None |
Scope | Changed | Confidentiality Impact | None |
Integrity Impact | None | Availability Impact | High |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Several vulnerabilities were discovered in BIND, a DNS server implementation. CVE-2019-6477 It was discovered that TCP-pipelined queries can bypass tcp-client limits resulting in denial of service. CVE-2020-8616 It was discovered that BIND does not sufficiently limit the number of fetches performed when processing referrals. An attacker can take advantage of this flaw to cause a denial of service (performance degradation) or use the recursing server in a reflection attack with a high amplification factor. CVE-2020-8617 It was discovered that a logic error in the code which checks TSIG validity can be used to trigger an assertion failure, resulting in denial of service. For the oldstable distribution (stretch), these problems have been fixed in version 1:9.10.3.dfsg.P4-12.3+deb9u6. For the stable distribution (buster), these problems have been fixed in version 1:9.11.5.P4+dfsg-5.1+deb10u1. We recommend that you upgrade your bind9 packages. For the detailed security status of bind9 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/bind9 |
Original Source
Url : http://www.debian.org/security/2020/dsa-4689 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
67 % | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
33 % | CWE-617 | Reachable Assertion |
CPE : Common Platform Enumeration
Snort® IPS/IDS
Date | Description |
---|---|
2020-09-02 | BIND DNS server TSIG denial of service attempt RuleID : 54630 - Revision : 1 - Type : PROTOCOL-DNS |
Alert History
Date | Informations |
---|---|
2020-05-23 13:03:43 |
|
2020-05-20 00:17:42 |
|