Versio.io

CVE-2020-8625

Common vulnerabilities & exposures (CVE)

CVE databaseCVE database blogpostRelease & EoL database
 
Published at: - 18-02-2021 12:15
Last modified: - 18-04-2022 09:25
Total changes: - 11

Description

BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting valid values for the tkey-gssapi-keytab or tkey-gssapi-credentialconfiguration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. The most likely outcome of a successful exploitation of the vulnerability is a crash of the named process. However, remote code execution, while unproven, is theoretically possible. Affects: BIND 9.5.0 -> 9.11.27, 9.12.0 -> 9.16.11, and versions BIND 9.11.3-S1 -> 9.11.27-S1 and 9.16.8-S1 -> 9.16.11-S1 of BIND Supported Preview Edition. Also release versions 9.17.0 -> 9.17.1 of the BIND 9.17 development branch

Common Vulnerability Scoring System (CVSS)

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
High
Attack complexity
Network
Attack vector
High
Availability
High
Confidentiality
High
Integrity
None
Privileges required
Unchanged
Scope
None
User interaction
8.1
Base score
2.2
5.9
Exploitability score
Impact score
 

Verification logic

OR
OR
vendor=isc AND product=bind AND versionEndIncluding=9.11.27 AND versionStartIncluding=9.5.0
vendor=isc AND product=bind AND version=9.11.3 AND update=s1 AND software_edition=supported_preview
vendor=isc AND product=bind AND version=9.11.5 AND update=s3 AND software_edition=supported_preview
vendor=isc AND product=bind AND version=9.11.5 AND update=s5 AND software_edition=supported_preview
vendor=isc AND product=bind AND version=9.11.6 AND update=s1 AND software_edition=supported_preview
vendor=isc AND product=bind AND version=9.11.7 AND update=s1 AND software_edition=supported_preview
vendor=isc AND product=bind AND version=9.11.8 AND update=s1 AND software_edition=supported_preview
vendor=isc AND product=bind AND version=9.11.21 AND update=s1 AND software_edition=supported_preview
vendor=isc AND product=bind AND version=9.11.27 AND update=s1 AND software_edition=supported_preview
vendor=isc AND product=bind AND versionEndIncluding=9.16.11 AND versionStartIncluding=9.12.0
vendor=isc AND product=bind AND version=9.16.8 AND update=s1 AND software_edition=supported_preview
vendor=isc AND product=bind AND version=9.16.11 AND update=s1 AND software_edition=supported_preview
vendor=isc AND product=bind AND version=9.17.0
vendor=isc AND product=bind AND version=9.17.1
OR
vendor=Debian AND product=debian_linux AND version=9.0
vendor=Debian AND product=debian_linux AND version=10.0
OR
vendor=fedoraproject AND product=fedora AND version=32
vendor=fedoraproject AND product=fedora AND version=33
vendor=fedoraproject AND product=fedora AND version=34
OR
vendor=siemens AND product=sinec_infrastructure_network_services AND versionEndExcluding=1.0.1.1
OR
vendor=netapp AND product=cloud_backup AND version=-
AND
OR
vendor=netapp AND product=a250_firmware AND version=-
OR
vendor=netapp AND product=a250 AND version=-
AND
OR
vendor=netapp AND product=500f_firmware AND version=-
OR
vendor=netapp AND product=500f AND version=-
 

Reference

 


Keywords

NVD

 

CVE-2020-8625

 

CVE

 

Common vulnerabilities & exposures

 

CVSS

 

Common vulnerability scoring system

 

Security

 

Vulnerabilities

 

Exposures

 

We use cookies to ensure that we give you the best experience on our website. Read privacy policies for more information.