|Category:||Debian Local Security Checks|
|Title:||Debian LTS: Security Advisory for bind9 (DLA-2355-1)|
|Summary:||The remote host is missing an update for the 'bind9'; package(s) announced via the DLA-2355-1 advisory.|
The remote host is missing an update for the 'bind9'
package(s) announced via the DLA-2355-1 advisory.
Two issues have been found in bind9, an Internet Domain Name Server.
Crafted responses to TSIG-signed requests could lead to an assertion
failure, causing the server to exit. This could be done by malicious
server operators or guessing attackers.
An assertions failure, causing the server to exit, can be exploited
by a query for an RSA signed zone.
'bind9' package(s) on Debian Linux.
For Debian 9 stretch, these problems have been fixed in version
We recommend that you upgrade your bind9 packages.
Common Vulnerability Exposure (CVE) ID: CVE-2020-8622|
Debian Security Information: DSA-4752 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2020-8623
|Copyright||Copyright (C) 2020 Greenbone Networks GmbH|
|This is only one of 85075 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.