|Category:||Huawei EulerOS Local Security Checks|
|Title:||Huawei EulerOS: Security Advisory for bind (EulerOS-SA-2020-2278)|
|Summary:||The remote host is missing an update for the Huawei EulerOS; 'bind' package(s) announced via the EulerOS-SA-2020-2278 advisory.|
The remote host is missing an update for the Huawei EulerOS
'bind' package(s) announced via the EulerOS-SA-2020-2278 advisory.
In BIND 9.0.0 - 9.11.21, 9.12.0 - 9.16.5, 9.17.0 - 9.17.3, also affects 9.9.3-S1 - 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker on the network path for a TSIG-signed request, or operating the server receiving the TSIG-signed request, could send a truncated response to that request, triggering an assertion failure, causing the server to exit. Alternately, an off-path attacker would have to correctly guess when a TSIG-signed request was sent, along with other characteristics of the packet and message, and spoof a truncated response to trigger an assertion failure, causing the server to exit.(CVE-2020-8622)
'bind' package(s) on Huawei EulerOS V2.0SP5.
Please install the updated package(s).
Common Vulnerability Exposure (CVE) ID: CVE-2020-8622|
Debian Security Information: DSA-4752 (Google Search)
SuSE Security Announcement: openSUSE-SU-2020:1699 (Google Search)
SuSE Security Announcement: openSUSE-SU-2020:1701 (Google Search)
|Copyright||Copyright (C) 2020 Greenbone Networks GmbH|
|This is only one of 86218 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.