Show plain JSON{"containers": {"cna": {"affected": [{"product": "BIND9", "vendor": "ISC", "versions": [{"changes": [{"at": "9.16.6", "status": "unaffected"}, {"at": "9.17.0", "status": "affected"}, {"at": "9.17.4", "status": "unaffected"}], "lessThan": "*", "status": "affected", "version": "9.14.0", "versionType": "custom"}]}], "credits": [{"lang": "en", "value": "ISC would like to thank Joseph Gullo for bringing this vulnerability to our attention."}], "datePublic": "2020-08-20T00:00:00", "descriptions": [{"lang": "en", "value": "In BIND 9.14.0 -> 9.16.5, 9.17.0 -> 9.17.3, If a server is configured with both QNAME minimization and 'forward first' then an attacker who can send queries to it may be able to trigger the condition that will cause the server to crash. Servers that 'forward only' are not affected."}], "exploits": [{"lang": "en", "value": "We are not aware of any active exploits."}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1"}}], "problemTypes": [{"descriptions": [{"description": "While query forwarding and QNAME minimization are mutually incompatible, BIND did sometimes allow QNAME minimization when continuing with recursion after 'forward first' did not result in an answer. In these cases the data used by QNAME minimization might be inconsistent, leading to an assertion failure, causing the server to exit. Affects BIND 9.14.0 -> 9.16.5, 9.17.0 -> 9.17.3", "lang": "en", "type": "text"}]}], "providerMetadata": {"dateUpdated": "2020-10-20T11:06:43", "orgId": "404fd4d2-a609-4245-b543-2c944a302a22", "shortName": "isc"}, "references": [{"tags": ["x_refsource_CONFIRM"], "url": "https://kb.isc.org/docs/cve-2020-8621"}, {"tags": ["x_refsource_CONFIRM"], "url": "https://security.netapp.com/advisory/ntap-20200827-0003/"}, {"name": "USN-4468-1", "tags": ["vendor-advisory", "x_refsource_UBUNTU"], "url": "https://usn.ubuntu.com/4468-1/"}, {"name": "GLSA-202008-19", "tags": ["vendor-advisory", "x_refsource_GENTOO"], "url": "https://security.gentoo.org/glsa/202008-19"}, {"tags": ["x_refsource_CONFIRM"], "url": "https://www.synology.com/security/advisory/Synology_SA_20_19"}, {"name": "openSUSE-SU-2020:1699", "tags": ["vendor-advisory", "x_refsource_SUSE"], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html"}, {"name": "openSUSE-SU-2020:1701", "tags": ["vendor-advisory", "x_refsource_SUSE"], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html"}], "solutions": [{"lang": "en", "value": "Upgrade to the patched release most closely related to your current version of BIND:\n\n BIND 9.16.6\n BIND 9.17.4"}], "source": {"discovery": "USER"}, "title": "Attempting QNAME minimization after forwarding can lead to an assertion failure in resolver.c", "workarounds": [{"lang": "en", "value": "No workarounds known."}], "x_generator": {"engine": "Vulnogram 0.0.9"}, "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "security-officer@isc.org", "DATE_PUBLIC": "2020-08-20T18:35:08.000Z", "ID": "CVE-2020-8621", "STATE": "PUBLIC", "TITLE": "Attempting QNAME minimization after forwarding can lead to an assertion failure in resolver.c"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "BIND9", "version": {"version_data": [{"version_affected": ">=", "version_name": "", "version_value": "9.14.0"}, {"version_affected": "<", "version_name": "", "version_value": "9.16.6"}, {"version_affected": ">=", "version_name": "", "version_value": "9.17.0"}, {"version_affected": "<", "version_name": "", "version_value": "9.17.4"}]}}]}, "vendor_name": "ISC"}]}}, "credit": [{"lang": "eng", "value": "ISC would like to thank Joseph Gullo for bringing this vulnerability to our attention."}], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "In BIND 9.14.0 -> 9.16.5, 9.17.0 -> 9.17.3, If a server is configured with both QNAME minimization and 'forward first' then an attacker who can send queries to it may be able to trigger the condition that will cause the server to crash. Servers that 'forward only' are not affected."}]}, "exploit": [{"lang": "en", "value": "We are not aware of any active exploits."}], "generator": {"engine": "Vulnogram 0.0.9"}, "impact": {"cvss": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1"}}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "While query forwarding and QNAME minimization are mutually incompatible, BIND did sometimes allow QNAME minimization when continuing with recursion after 'forward first' did not result in an answer. In these cases the data used by QNAME minimization might be inconsistent, leading to an assertion failure, causing the server to exit. Affects BIND 9.14.0 -> 9.16.5, 9.17.0 -> 9.17.3"}]}]}, "references": {"reference_data": [{"name": "https://kb.isc.org/docs/cve-2020-8621", "refsource": "CONFIRM", "url": "https://kb.isc.org/docs/cve-2020-8621"}, {"name": "https://security.netapp.com/advisory/ntap-20200827-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200827-0003/"}, {"name": "USN-4468-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4468-1/"}, {"name": "GLSA-202008-19", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202008-19"}, {"name": "https://www.synology.com/security/advisory/Synology_SA_20_19", "refsource": "CONFIRM", "url": "https://www.synology.com/security/advisory/Synology_SA_20_19"}, {"name": "openSUSE-SU-2020:1699", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html"}, {"name": "openSUSE-SU-2020:1701", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html"}]}, "solution": [{"lang": "en", "value": "Upgrade to the patched release most closely related to your current version of BIND:\n\n BIND 9.16.6\n BIND 9.17.4"}], "source": {"discovery": "USER"}, "work_around": [{"lang": "en", "value": "No workarounds known."}]}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-04T10:03:46.261Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "https://kb.isc.org/docs/cve-2020-8621"}, {"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "https://security.netapp.com/advisory/ntap-20200827-0003/"}, {"name": "USN-4468-1", "tags": ["vendor-advisory", "x_refsource_UBUNTU", "x_transferred"], "url": "https://usn.ubuntu.com/4468-1/"}, {"name": "GLSA-202008-19", "tags": ["vendor-advisory", "x_refsource_GENTOO", "x_transferred"], "url": "https://security.gentoo.org/glsa/202008-19"}, {"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "https://www.synology.com/security/advisory/Synology_SA_20_19"}, {"name": "openSUSE-SU-2020:1699", "tags": ["vendor-advisory", "x_refsource_SUSE", "x_transferred"], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html"}, {"name": "openSUSE-SU-2020:1701", "tags": ["vendor-advisory", "x_refsource_SUSE", "x_transferred"], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html"}]}]}, "cveMetadata": {"assignerOrgId": "404fd4d2-a609-4245-b543-2c944a302a22", "assignerShortName": "isc", "cveId": "CVE-2020-8621", "datePublished": "2020-08-21T20:50:18.959156Z", "dateReserved": "2020-02-05T00:00:00", "dateUpdated": "2024-09-16T16:18:00.777Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}