Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2020-8625
Description:BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting valid values for the tkey-gssapi-keytab or tkey-gssapi- credentialconfiguration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. The most likely outcome of a successful exploitation of the vulnerability is a crash of the named process. However, remote code execution, while unproven, is theoretically possible. Affects: BIND 9.5.0 -> 9.11.27, 9.12.0 -> 9.16.11, and versions BIND 9.11.3-S1 -> 9.11.27-S1 and 9.16.8-S1 -> 9.16.11-S1 of BIND Supported Preview Edition. Also release versions 9.17.0 -> 9.17.1 of the BIND 9.17 development branch
Test IDs: 1.3.6.1.4.1.25623.1.1.2.2021.1918   1.3.6.1.4.1.25623.1.1.2.2021.1766   1.3.6.1.4.1.25623.1.0.145412   1.3.6.1.4.1.25623.1.1.2.2021.1939   1.3.6.1.4.1.25623.1.0.853738   1.3.6.1.4.1.25623.1.0.844834   1.3.6.1.4.1.25623.1.0.145413   1.3.6.1.4.1.25623.1.1.2.2021.1894   1.3.6.1.4.1.25623.1.1.4.2021.0503.1   1.3.6.1.4.1.25623.1.0.879011   1.3.6.1.4.1.25623.1.1.2.2021.1865   1.3.6.1.4.1.25623.1.0.879016   1.3.6.1.4.1.25623.1.0.704857   1.3.6.1.4.1.25623.1.1.4.2021.0504.1   1.3.6.1.4.1.25623.1.0.883330   1.3.6.1.4.1.25623.1.0.879151   1.3.6.1.4.1.25623.1.1.4.2021.0507.1   1.3.6.1.4.1.25623.1.1.2.2021.1396   1.3.6.1.4.1.25623.1.0.892568   1.3.6.1.4.1.25623.1.1.2.2021.2042   1.3.6.1.4.1.25623.1.1.4.2021.14632.1   1.3.6.1.4.1.25623.1.1.2.2021.1995   1.3.6.1.4.1.25623.1.1.2.2021.2354  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2020-8625
https://kb.isc.org/v1/docs/cve-2020-8625
Debian Security Information: DSA-4857 (Google Search)
https://www.debian.org/security/2021/dsa-4857
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QWCMBOSZOJIIET7BWTRYS3HLX5TSDKHX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KYXAF7G45RXDVNUTWWCI2CVTHRZ67LST/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBTPWRQWRQEJNWY4NHO4WLS4KLJ3ERHZ/
https://www.zerodayinitiative.com/advisories/ZDI-21-195/
https://lists.debian.org/debian-lts-announce/2021/02/msg00029.html
http://www.openwall.com/lists/oss-security/2021/02/19/1
http://www.openwall.com/lists/oss-security/2021/02/20/2




© 1998-2024 E-Soft Inc. All rights reserved.