Vulnerability   
Search   
    Search 187964 CVE descriptions
and 85075 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.704752
Category:Debian Local Security Checks
Title:Debian: Security Advisory for bind9 (DSA-4752-1)
Summary:The remote host is missing an update for the 'bind9'; package(s) announced via the DSA-4752-1 advisory.
Description:Summary:
The remote host is missing an update for the 'bind9'
package(s) announced via the DSA-4752-1 advisory.

Vulnerability Insight:
Several vulnerabilities were discovered in BIND, a DNS server
implementation.

CVE-2020-8619
It was discovered that an asterisk character in an empty non terminal can cause an assertion failure, resulting in denial
of service.

CVE-2020-8622
Dave Feldman, Jeff Warren, and Joel Cunningham reported that a
truncated TSIG response can lead to an assertion failure, resulting
in denial of service.

CVE-2020-8623
Lyu Chiy reported that a flaw in the native PKCS#11 code can lead
to a remotely triggerable assertion failure, resulting in denial
of service.

CVE-2020-8624
Joop Boonen reported that update-policy rules of type subdomain
are enforced incorrectly, allowing updates to all parts of the zone
along with the intended subdomain.

Affected Software/OS:
'bind9' package(s) on Debian Linux.

Solution:
For the stable distribution (buster), these problems have been fixed in
version 1:9.11.5.P4+dfsg-5.1+deb10u2.

We recommend that you upgrade your bind9 packages.

CVSS Score:
4.3

CVSS Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2020-8619
https://kb.isc.org/docs/cve-2020-8619
Debian Security Information: DSA-4752 (Google Search)
https://www.debian.org/security/2020/dsa-4752
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CNFTTYJ5JJJJ6QG3AHXJGDIIEYMDFWFW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIOXMJX4N3LBKC65OXNBE52W4GAS7QEX/
https://usn.ubuntu.com/4399-1/
Common Vulnerability Exposure (CVE) ID: CVE-2020-8622
https://kb.isc.org/docs/cve-2020-8622
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKAMJZXR66P6S5LEU4SN7USSNCWTXEXP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQN62GBMCIC5AY4KYADGXNKVY6AJKSJE/
https://security.gentoo.org/glsa/202008-19
https://lists.debian.org/debian-lts-announce/2020/08/msg00053.html
https://usn.ubuntu.com/4468-1/
https://usn.ubuntu.com/4468-2/
Common Vulnerability Exposure (CVE) ID: CVE-2020-8623
https://kb.isc.org/docs/cve-2020-8623
Common Vulnerability Exposure (CVE) ID: CVE-2020-8624
https://kb.isc.org/docs/cve-2020-8624
CopyrightCopyright (C) 2020 Greenbone Networks GmbH

This is only one of 85075 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2020 E-Soft Inc. All rights reserved.