CVE-2020-8617

Scores

EPSS

0.926high92.6%
0%20%40%60%80%100%

Percentile: 92.6%

CVSS

7.5high3.x
0246810

CVSS Score: 7.5/10

All CVSS Scores

CVSS 3.x
7.5

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVSS 2.0
4.3

Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Description

Using a specially-crafted message, an attacker may potentially cause a BIND server to reach an inconsistent state if the attacker knows (or successfully guesses) the name of a TSIG key used by the server. Since BIND, by default, configures a local session key even on servers whose configuration does not otherwise make use of it, almost all current BIND servers are vulnerable. In releases of BIND dating from March 2018 and after, an assertion check in tsig.c detects this inconsistent state and deliberately exits. Prior to the introduction of the check the server would continue operating in an inconsistent state, with potentially harmful results.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

astradebiannvdredhatubuntu

CWEs

CWE-617

Related Vulnerabilities

Exploits

Exploit ID: 48521

Source: exploitdb

URL: https://www.exploit-db.com/exploits/48521

Exploit ID: CVE-2020-8617

Source: github-poc

URL: https://github.com/gothburz/cve-2020-8617

Vulnerable Software (30)

Type: Configuration

Product: bind

Operating System: rhel 6

Trait:
{  "fixed": "9.8.2-0.68.rc1.el6_10.7"}

Source: redhat

Type: Configuration

Product: bind

Operating System: rhel 6.5

Trait:
{  "fixed": "9.8.2-0.23.rc1.el6_5.9"}

Source: redhat

Type: Configuration

Product: bind

Operating System: rhel 6.6

Trait:
{  "fixed": "9.8.2-0.30.rc1.el6_6.11"}

Source: redhat

Type: Configuration

Product: bind

Operating System: rhel 7

Trait:
{  "fixed": "9.11.4-16.P2.el7_8.6"}

Source: redhat

Type: Configuration

Product: bind

Operating System: rhel 7.2

Trait:
{  "fixed": "9.9.4-29.el7_2.9"}

Source: redhat

Type: Configuration

Product: bind

Operating System: rhel 7.3

Trait:
{  "fixed": "9.9.4-50.el7_3.4"}

Source: redhat

Type: Configuration

Product: bind

Operating System: rhel 7.3

Trait:
{  "fixed": "9.9.4-50.el7_3.4"}

Source: redhat

Type: Configuration

Product: bind

Operating System: rhel 7.3

Trait:
{  "fixed": "9.9.4-50.el7_3.4"}

Source: redhat

Type: Configuration

Product: bind

Operating System: rhel 7.4

Trait:
{  "fixed": "9.9.4-51.el7_4.4"}

Source: redhat

Type: Configuration

Product: bind

Operating System: rhel 7.4

Trait:
{  "fixed": "9.9.4-51.el7_4.4"}

Source: redhat

Type: Configuration

Product: bind

Operating System: rhel 7.4

Trait:
{  "fixed": "9.9.4-51.el7_4.4"}

Source: redhat

Type: Configuration

Product: bind

Operating System: rhel 7.6

Trait:
{  "fixed": "9.9.4-74.el7_6.4"}

Source: redhat

Type: Configuration

Product: bind

Operating System: rhel 7.7

Trait:
{  "fixed": "9.11.4-9.P2.el7_7.1"}

Source: redhat

Type: Configuration

Product: bind

Operating System: rhel

Trait:
{  "fixed": "9.11.13-5.el8_2"}

Source: redhat

Type: Configuration

Product: bind

Operating System: rhel 8

Trait:
{  "fixed": "9.11.13-5.el8_2"}

Source: redhat

Type: Configuration

Product: bind

Operating System: rhel

Trait:
{  "fixed": "9.11.4-19.P2.el8_0"}

Source: redhat

Type: Configuration

Product: bind

Operating System: rhel

Trait:
{  "fixed": "9.11.4-26.P2.el8_1.3"}

Source: redhat

Type: Configuration

Product: bind9

Operating System: ubuntu bionic 18.04

Trait:
{  "fixed": "1:9.11.3+dfsg-1ubuntu1.12"}

Source: ubuntu

Type: Configuration

Product: bind9

Operating System: ubuntu eoan 19.10

Trait:
{  "fixed": "1:9.11.5.P4+dfsg-5.1ubuntu2.2"}

Source: ubuntu

Type: Configuration

Product: bind9

Operating System: debian

Trait:
{  "fixed": "1:9.16.3-1"}

Source: debian