ID

VAR-202005-1028


CVE

CVE-2020-8616


TITLE

XACK DNS Service operation interruption in (DoS) Vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2020-000036

DESCRIPTION

A malicious actor who intentionally exploits this lack of effective limitation on the number of fetches performed when processing referrals can, through the use of specially crafted referrals, cause a recursing server to issue a very large number of fetches in an attempt to process the referral. This has at least two potential effects: The performance of the recursing server can potentially be degraded by the additional work required to perform these fetches, and The attacker can exploit this behavior to use the recursing server as a reflector in a reflection attack with a high amplification factor. XACK DNS Is a corporation XACK Provides DNS Software for servers. XACK DNS In general NXNSAttack Service disruption due to a problem called (DoS) There are vulnerabilities that can be attacked. This vulnerability information is provided by the developer for the purpose of disseminating it to product users. IPA Report to JPCERT/CC Coordinated with the developer.The following service operation interruptions by a remote third party (DoS) You may be attacked. -Increases the load of the full resolver and reduces performance. ・ Abuse the full resolver as a stepping stone for reflection attacks. ISC (Internet Systems Consortium) Provides BIND There are multiple vulnerabilities in. * DNS Insufficient control of name resolution behavior - CVE-2020-8616 * tsig.c Assertion error occurs - CVE-2020-8617The expected impact depends on each vulnerability, but it may be affected as follows. CVE-2019-6477 It was discovered that TCP-pipelined queries can bypass tcp-client limits resulting in denial of service. For the oldstable distribution (stretch), these problems have been fixed in version 1:9.10.3.dfsg.P4-12.3+deb9u6. For the stable distribution (buster), these problems have been fixed in version 1:9.11.5.P4+dfsg-5.1+deb10u1. We recommend that you upgrade your bind9 packages. For the detailed security status of bind9 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/bind9 Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAl7ENhhfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0TG0w//d/ZEG5TM8bmDZSBkB0n+JZ9S1ZOuRbETrtXAYnI1DjQZzk427PR9Vm39 tMbe2UOmYgxD/UybCL7tGNsNqFo4iRrefnEU47I8nWp1szCo9MsUbl9itmZfprGF lOvMvyklu8WZFXLSHOntOEKANv5k/ygq9ux4t/YWpL4jdpfCR+fdECfr16vV5XkR inKQuGDokmDs0E+bJHKUGWTcTsTXmcFZIaurKx+IeHAyQxbEmV1qiJHQKtvkmp9s kUlNyrfs1tLXM+JeQK0GtPTJuiMpznkisvC1/hJVPNy2kvGl+5pZ6LRB7BzuswSp HokcQ4p8BIw1LAGXq+TvnJaQd+mfHHfasI2FS+XRWEos92bF1+TlxFW4gTLghMYV ssuK4nBIbvucrNXc2Wcm7n/1UxEiAiT7Zf9mKFBdBxZSxz8ueLh2js0SKxH9GTBF Rx6x1NXGLI9u9QQgOOzyQh8ClRLC1Z2UtHQLLITTT7UlnXRSO1OvmJEFFuA+0E5/ FK2zzpD8a3+cHS5O1+a1LihqiwxDkFJXNY/d/BSLAoNeYyGjgQq/1AgoEbjVDO4o ye6ttRSaaMUS8rvUrE9U4PfSyclHke+filK4KURkY7kZ+UEH7XH2jCZunW/POpKp WIBvqVSEK6qTYWji5Ayucm2tgmUMIxV+tH1Im2Im6HjrP/pyGrs= =SqNI -----END PGP SIGNATURE----- . 6.6) - x86_64 3. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: bind security update Advisory ID: RHSA-2020:3475-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2020:3475 Issue date: 2020-08-18 CVE Names: CVE-2020-8616 CVE-2020-8617 ===================================================================== 1. Summary: An update for bind is now available for Red Hat Enterprise Linux 7.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux ComputeNode EUS (v. 7.6) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6) - x86_64 Red Hat Enterprise Linux Server EUS (v. 7.6) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional EUS (v. 7.6) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) - aarch64, noarch, ppc64le, s390x Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7) - aarch64, ppc64le, s390x 3. Description: The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: BIND does not sufficiently limit the number of fetches performed when processing referrals (CVE-2020-8616) * bind: A logic error in code which checks TSIG validity can be used to trigger an assertion failure in tsig.c (CVE-2020-8617) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, the BIND daemon (named) will be restarted automatically. 5. Bugs fixed (https://bugzilla.redhat.com/): 1836118 - CVE-2020-8616 bind: BIND does not sufficiently limit the number of fetches performed when processing referrals 1836124 - CVE-2020-8617 bind: A logic error in code which checks TSIG validity can be used to trigger an assertion failure in tsig.c 6. Package List: Red Hat Enterprise Linux ComputeNode EUS (v. 7.6): Source: bind-9.9.4-74.el7_6.4.src.rpm noarch: bind-license-9.9.4-74.el7_6.4.noarch.rpm x86_64: bind-debuginfo-9.9.4-74.el7_6.4.i686.rpm bind-debuginfo-9.9.4-74.el7_6.4.x86_64.rpm bind-libs-9.9.4-74.el7_6.4.i686.rpm bind-libs-9.9.4-74.el7_6.4.x86_64.rpm bind-libs-lite-9.9.4-74.el7_6.4.i686.rpm bind-libs-lite-9.9.4-74.el7_6.4.x86_64.rpm bind-utils-9.9.4-74.el7_6.4.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6): x86_64: bind-9.9.4-74.el7_6.4.x86_64.rpm bind-chroot-9.9.4-74.el7_6.4.x86_64.rpm bind-debuginfo-9.9.4-74.el7_6.4.i686.rpm bind-debuginfo-9.9.4-74.el7_6.4.x86_64.rpm bind-devel-9.9.4-74.el7_6.4.i686.rpm bind-devel-9.9.4-74.el7_6.4.x86_64.rpm bind-lite-devel-9.9.4-74.el7_6.4.i686.rpm bind-lite-devel-9.9.4-74.el7_6.4.x86_64.rpm bind-pkcs11-9.9.4-74.el7_6.4.x86_64.rpm bind-pkcs11-devel-9.9.4-74.el7_6.4.i686.rpm bind-pkcs11-devel-9.9.4-74.el7_6.4.x86_64.rpm bind-pkcs11-libs-9.9.4-74.el7_6.4.i686.rpm bind-pkcs11-libs-9.9.4-74.el7_6.4.x86_64.rpm bind-pkcs11-utils-9.9.4-74.el7_6.4.x86_64.rpm bind-sdb-9.9.4-74.el7_6.4.x86_64.rpm bind-sdb-chroot-9.9.4-74.el7_6.4.x86_64.rpm Red Hat Enterprise Linux Server EUS (v. 7.6): Source: bind-9.9.4-74.el7_6.4.src.rpm noarch: bind-license-9.9.4-74.el7_6.4.noarch.rpm ppc64: bind-9.9.4-74.el7_6.4.ppc64.rpm bind-chroot-9.9.4-74.el7_6.4.ppc64.rpm bind-debuginfo-9.9.4-74.el7_6.4.ppc.rpm bind-debuginfo-9.9.4-74.el7_6.4.ppc64.rpm bind-libs-9.9.4-74.el7_6.4.ppc.rpm bind-libs-9.9.4-74.el7_6.4.ppc64.rpm bind-libs-lite-9.9.4-74.el7_6.4.ppc.rpm bind-libs-lite-9.9.4-74.el7_6.4.ppc64.rpm bind-utils-9.9.4-74.el7_6.4.ppc64.rpm ppc64le: bind-9.9.4-74.el7_6.4.ppc64le.rpm bind-chroot-9.9.4-74.el7_6.4.ppc64le.rpm bind-debuginfo-9.9.4-74.el7_6.4.ppc64le.rpm bind-libs-9.9.4-74.el7_6.4.ppc64le.rpm bind-libs-lite-9.9.4-74.el7_6.4.ppc64le.rpm bind-pkcs11-9.9.4-74.el7_6.4.ppc64le.rpm bind-pkcs11-libs-9.9.4-74.el7_6.4.ppc64le.rpm bind-pkcs11-utils-9.9.4-74.el7_6.4.ppc64le.rpm bind-utils-9.9.4-74.el7_6.4.ppc64le.rpm s390x: bind-9.9.4-74.el7_6.4.s390x.rpm bind-chroot-9.9.4-74.el7_6.4.s390x.rpm bind-debuginfo-9.9.4-74.el7_6.4.s390.rpm bind-debuginfo-9.9.4-74.el7_6.4.s390x.rpm bind-libs-9.9.4-74.el7_6.4.s390.rpm bind-libs-9.9.4-74.el7_6.4.s390x.rpm bind-libs-lite-9.9.4-74.el7_6.4.s390.rpm bind-libs-lite-9.9.4-74.el7_6.4.s390x.rpm bind-utils-9.9.4-74.el7_6.4.s390x.rpm x86_64: bind-9.9.4-74.el7_6.4.x86_64.rpm bind-chroot-9.9.4-74.el7_6.4.x86_64.rpm bind-debuginfo-9.9.4-74.el7_6.4.i686.rpm bind-debuginfo-9.9.4-74.el7_6.4.x86_64.rpm bind-libs-9.9.4-74.el7_6.4.i686.rpm bind-libs-9.9.4-74.el7_6.4.x86_64.rpm bind-libs-lite-9.9.4-74.el7_6.4.i686.rpm bind-libs-lite-9.9.4-74.el7_6.4.x86_64.rpm bind-pkcs11-9.9.4-74.el7_6.4.x86_64.rpm bind-pkcs11-libs-9.9.4-74.el7_6.4.i686.rpm bind-pkcs11-libs-9.9.4-74.el7_6.4.x86_64.rpm bind-pkcs11-utils-9.9.4-74.el7_6.4.x86_64.rpm bind-utils-9.9.4-74.el7_6.4.x86_64.rpm Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7): Source: bind-9.9.4-74.el7_6.4.src.rpm aarch64: bind-9.9.4-74.el7_6.4.aarch64.rpm bind-chroot-9.9.4-74.el7_6.4.aarch64.rpm bind-debuginfo-9.9.4-74.el7_6.4.aarch64.rpm bind-libs-9.9.4-74.el7_6.4.aarch64.rpm bind-libs-lite-9.9.4-74.el7_6.4.aarch64.rpm bind-pkcs11-9.9.4-74.el7_6.4.aarch64.rpm bind-pkcs11-libs-9.9.4-74.el7_6.4.aarch64.rpm bind-pkcs11-utils-9.9.4-74.el7_6.4.aarch64.rpm bind-utils-9.9.4-74.el7_6.4.aarch64.rpm noarch: bind-license-9.9.4-74.el7_6.4.noarch.rpm ppc64le: bind-9.9.4-74.el7_6.4.ppc64le.rpm bind-chroot-9.9.4-74.el7_6.4.ppc64le.rpm bind-debuginfo-9.9.4-74.el7_6.4.ppc64le.rpm bind-libs-9.9.4-74.el7_6.4.ppc64le.rpm bind-libs-lite-9.9.4-74.el7_6.4.ppc64le.rpm bind-pkcs11-9.9.4-74.el7_6.4.ppc64le.rpm bind-pkcs11-libs-9.9.4-74.el7_6.4.ppc64le.rpm bind-pkcs11-utils-9.9.4-74.el7_6.4.ppc64le.rpm bind-utils-9.9.4-74.el7_6.4.ppc64le.rpm s390x: bind-9.9.4-74.el7_6.4.s390x.rpm bind-chroot-9.9.4-74.el7_6.4.s390x.rpm bind-debuginfo-9.9.4-74.el7_6.4.s390.rpm bind-debuginfo-9.9.4-74.el7_6.4.s390x.rpm bind-libs-9.9.4-74.el7_6.4.s390.rpm bind-libs-9.9.4-74.el7_6.4.s390x.rpm bind-libs-lite-9.9.4-74.el7_6.4.s390.rpm bind-libs-lite-9.9.4-74.el7_6.4.s390x.rpm bind-utils-9.9.4-74.el7_6.4.s390x.rpm Red Hat Enterprise Linux Server Optional EUS (v. 7.6): ppc64: bind-debuginfo-9.9.4-74.el7_6.4.ppc.rpm bind-debuginfo-9.9.4-74.el7_6.4.ppc64.rpm bind-devel-9.9.4-74.el7_6.4.ppc.rpm bind-devel-9.9.4-74.el7_6.4.ppc64.rpm bind-lite-devel-9.9.4-74.el7_6.4.ppc.rpm bind-lite-devel-9.9.4-74.el7_6.4.ppc64.rpm bind-pkcs11-9.9.4-74.el7_6.4.ppc64.rpm bind-pkcs11-devel-9.9.4-74.el7_6.4.ppc.rpm bind-pkcs11-devel-9.9.4-74.el7_6.4.ppc64.rpm bind-pkcs11-libs-9.9.4-74.el7_6.4.ppc.rpm bind-pkcs11-libs-9.9.4-74.el7_6.4.ppc64.rpm bind-pkcs11-utils-9.9.4-74.el7_6.4.ppc64.rpm bind-sdb-9.9.4-74.el7_6.4.ppc64.rpm bind-sdb-chroot-9.9.4-74.el7_6.4.ppc64.rpm ppc64le: bind-debuginfo-9.9.4-74.el7_6.4.ppc64le.rpm bind-devel-9.9.4-74.el7_6.4.ppc64le.rpm bind-lite-devel-9.9.4-74.el7_6.4.ppc64le.rpm bind-pkcs11-devel-9.9.4-74.el7_6.4.ppc64le.rpm bind-sdb-9.9.4-74.el7_6.4.ppc64le.rpm bind-sdb-chroot-9.9.4-74.el7_6.4.ppc64le.rpm s390x: bind-debuginfo-9.9.4-74.el7_6.4.s390.rpm bind-debuginfo-9.9.4-74.el7_6.4.s390x.rpm bind-devel-9.9.4-74.el7_6.4.s390.rpm bind-devel-9.9.4-74.el7_6.4.s390x.rpm bind-lite-devel-9.9.4-74.el7_6.4.s390.rpm bind-lite-devel-9.9.4-74.el7_6.4.s390x.rpm bind-pkcs11-9.9.4-74.el7_6.4.s390x.rpm bind-pkcs11-devel-9.9.4-74.el7_6.4.s390.rpm bind-pkcs11-devel-9.9.4-74.el7_6.4.s390x.rpm bind-pkcs11-libs-9.9.4-74.el7_6.4.s390.rpm bind-pkcs11-libs-9.9.4-74.el7_6.4.s390x.rpm bind-pkcs11-utils-9.9.4-74.el7_6.4.s390x.rpm bind-sdb-9.9.4-74.el7_6.4.s390x.rpm bind-sdb-chroot-9.9.4-74.el7_6.4.s390x.rpm x86_64: bind-debuginfo-9.9.4-74.el7_6.4.i686.rpm bind-debuginfo-9.9.4-74.el7_6.4.x86_64.rpm bind-devel-9.9.4-74.el7_6.4.i686.rpm bind-devel-9.9.4-74.el7_6.4.x86_64.rpm bind-lite-devel-9.9.4-74.el7_6.4.i686.rpm bind-lite-devel-9.9.4-74.el7_6.4.x86_64.rpm bind-pkcs11-devel-9.9.4-74.el7_6.4.i686.rpm bind-pkcs11-devel-9.9.4-74.el7_6.4.x86_64.rpm bind-sdb-9.9.4-74.el7_6.4.x86_64.rpm bind-sdb-chroot-9.9.4-74.el7_6.4.x86_64.rpm Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7): aarch64: bind-debuginfo-9.9.4-74.el7_6.4.aarch64.rpm bind-devel-9.9.4-74.el7_6.4.aarch64.rpm bind-lite-devel-9.9.4-74.el7_6.4.aarch64.rpm bind-pkcs11-devel-9.9.4-74.el7_6.4.aarch64.rpm bind-sdb-9.9.4-74.el7_6.4.aarch64.rpm bind-sdb-chroot-9.9.4-74.el7_6.4.aarch64.rpm ppc64le: bind-debuginfo-9.9.4-74.el7_6.4.ppc64le.rpm bind-devel-9.9.4-74.el7_6.4.ppc64le.rpm bind-lite-devel-9.9.4-74.el7_6.4.ppc64le.rpm bind-pkcs11-devel-9.9.4-74.el7_6.4.ppc64le.rpm bind-sdb-9.9.4-74.el7_6.4.ppc64le.rpm bind-sdb-chroot-9.9.4-74.el7_6.4.ppc64le.rpm s390x: bind-debuginfo-9.9.4-74.el7_6.4.s390.rpm bind-debuginfo-9.9.4-74.el7_6.4.s390x.rpm bind-devel-9.9.4-74.el7_6.4.s390.rpm bind-devel-9.9.4-74.el7_6.4.s390x.rpm bind-lite-devel-9.9.4-74.el7_6.4.s390.rpm bind-lite-devel-9.9.4-74.el7_6.4.s390x.rpm bind-pkcs11-9.9.4-74.el7_6.4.s390x.rpm bind-pkcs11-devel-9.9.4-74.el7_6.4.s390.rpm bind-pkcs11-devel-9.9.4-74.el7_6.4.s390x.rpm bind-pkcs11-libs-9.9.4-74.el7_6.4.s390.rpm bind-pkcs11-libs-9.9.4-74.el7_6.4.s390x.rpm bind-pkcs11-utils-9.9.4-74.el7_6.4.s390x.rpm bind-sdb-9.9.4-74.el7_6.4.s390x.rpm bind-sdb-chroot-9.9.4-74.el7_6.4.s390x.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2020-8616 https://access.redhat.com/security/cve/CVE-2020-8617 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2020 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXzvPWNzjgjWX9erEAQhQyRAAnxD9PRh6s8M0dr/s5alz3+PhYJImyu2L ACYKqdzb3N+O9vx2CfOkOVh28o87nSE+j6T30OnV2pLtxAKppcgjY4uXT7GR9V0t PqxHhcqN/KoEwpw+KMiVc4reaPzoZATQQqUMI5+syHRPPgYATAQD4qES5+bDgeTS Rd9GeM82zB1lmXCP6+rzzLJKnFSmJODdYS9Clz++0oVEh9OK1P7onHp7UeWbHmeC Ki9ChSSMSRZrSD9sGnwK6rAW3vQ/sAGwUGcQ9YaUhOilK6ZX0LTYJGLGtT3byfo4 X0IJVj3euwFmaYD9A2kRfi5FB6/gy959gLSlFsg0znCooAPXSRH6l78dNixvah9o 5WD0fgmG8uv40u+ogx7dsOf1EOSH5w/dUqEpOLx092CTsv/wYHzCODoytYiBhz43 frQlqPq71DRDLHIDBxu6w+FmjBwfgt7trBMJ8AMJcvbYgOxzDzVGtoNTlL6s2Fm2 OMbi36UrzqCPj08q0Xi2wJZZQk03n0lkLbHR93v4J6n8CdvzS953eHsQCIsGQf00 cvKa8PwneZNOlls56MmMH35aRiwxbzO1wVgcXTIDbzQJEQvylh9DMb7/hjNw4uzZ MKDVEYCxgD9HN2EzPILKudYbR7yD6h3FyyBs4muSOgQPY2MiXbXNfApYBJH7KapV 7Ubhpgbd4Yo= =Oe0L -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . Description: Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Solution: For OpenShift Container Platform 4.3 see the following documentation, which will be updated shortly for release 4.3.25, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update: https://docs.openshift.com/container-platform/4.3/release_notes/ocp-4-3-rel ease-notes.html Details on how to access this content are available at https://docs.openshift.com/container-platform/4.3/updating/updating-cluster - -cli.html. Bugs fixed (https://bugzilla.redhat.com/): 1808130 - CVE-2020-1750 machine-config-operator-container: mmap stressor makes the cluster unresponsive 5. Bugs fixed (https://bugzilla.redhat.com/): 1821583 - CVE-2020-8555 kubernetes: Server side request forgery (SSRF) in kube-controller-manager allows users to leak secret information 5. 7.7) - ppc64, ppc64le, s390x, x86_64 3

Trust: 3.06

sources: NVD: CVE-2020-8616 // JVNDB: JVNDB-2020-000036 // JVNDB: JVNDB-2020-004591 // VULMON: CVE-2020-8616 // PACKETSTORM: 168830 // PACKETSTORM: 158805 // PACKETSTORM: 158908 // PACKETSTORM: 158130 // PACKETSTORM: 158131 // PACKETSTORM: 158720 // PACKETSTORM: 158806

AFFECTED PRODUCTS

vendor:iscmodel:bindscope:eqversion:9.10.5

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:10.0

Trust: 1.0

vendor:iscmodel:bindscope:gteversion:9.15.0

Trust: 1.0

vendor:iscmodel:bindscope:lteversion:9.16.2

Trust: 1.0

vendor:iscmodel:bindscope:gteversion:9.17.0

Trust: 1.0

vendor:iscmodel:bindscope:eqversion:9.11.5

Trust: 1.0

vendor:iscmodel:bindscope:eqversion:9.11.3

Trust: 1.0

vendor:iscmodel:bindscope:gteversion:9.12.0

Trust: 1.0

vendor:iscmodel:bindscope:lteversion:9.13.7

Trust: 1.0

vendor:iscmodel:bindscope:gteversion:9.16.0

Trust: 1.0

vendor:iscmodel:bindscope:eqversion:9.12.4

Trust: 1.0

vendor:iscmodel:bindscope:lteversion:9.15.6

Trust: 1.0

vendor:iscmodel:bindscope:eqversion:9.11.7

Trust: 1.0

vendor:iscmodel:bindscope:eqversion:9.11.6

Trust: 1.0

vendor:iscmodel:bindscope:gteversion:9.14.0

Trust: 1.0

vendor:iscmodel:bindscope:eqversion:9.10.7

Trust: 1.0

vendor:iscmodel:bindscope:eqversion:9.9.3

Trust: 1.0

vendor:iscmodel:bindscope:eqversion:9.11.8

Trust: 1.0

vendor:iscmodel:bindscope:gteversion:9.0.0

Trust: 1.0

vendor:iscmodel:bindscope:lteversion:9.11.18

Trust: 1.0

vendor:iscmodel:bindscope:lteversion:9.12.4

Trust: 1.0

vendor:iscmodel:bindscope:gteversion:9.13.0

Trust: 1.0

vendor:iscmodel:bindscope:lteversion:9.14.11

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:iscmodel:bindscope:lteversion:9.17.1

Trust: 1.0

vendor:xackmodel:dnsscope:eqversion:1.10.0 から 1.10.8

Trust: 0.8

vendor:xackmodel:dnsscope:eqversion:1.11.0 から 1.11.4

Trust: 0.8

vendor:xackmodel:dnsscope:eqversion:1.7.0 から 1.7.18

Trust: 0.8

vendor:xackmodel:dnsscope:eqversion:1.7.0 の全て

Trust: 0.8

vendor:xackmodel:dnsscope:eqversion:1.8.0 から 1.8.23

Trust: 0.8

vendor:iscmodel:bindscope:eqversion:9.11.0 から 9.11.18

Trust: 0.8

vendor:iscmodel:bindscope:eqversion:9.12.0 から 9.12.4-p2

Trust: 0.8

vendor:iscmodel:bindscope:eqversion:9.14.0 から 9.14.11

Trust: 0.8

vendor:iscmodel:bindscope:eqversion:9.16.0 から 9.16.2

Trust: 0.8

vendor:iscmodel:bindscope:eqversion:supported preview edition 9.9.3-s1 から 9.11.18-s1

Trust: 0.8

sources: JVNDB: JVNDB-2020-000036 // JVNDB: JVNDB-2020-004591 // NVD: CVE-2020-8616

CVSS

SEVERITY

CVSSV2

CVSSV3

IPA: JVNDB-2020-004591
value: HIGH

Trust: 1.6

nvd@nist.gov: CVE-2020-8616
value: HIGH

Trust: 1.0

security-officer@isc.org: CVE-2020-8616
value: HIGH

Trust: 1.0

IPA: JVNDB-2020-000036
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202005-917
value: HIGH

Trust: 0.6

VULMON: CVE-2020-8616
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-8616
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

IPA: JVNDB-2020-000036
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

nvd@nist.gov: CVE-2020-8616
baseSeverity: HIGH
baseScore: 8.6
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 4.0
version: 3.1

Trust: 2.0

IPA: JVNDB-2020-000036
baseSeverity: HIGH
baseScore: 8.6
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

IPA score: JVNDB-2020-004591
baseSeverity: HIGH
baseScore: 8.6
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

IPA score: JVNDB-2020-004591
baseSeverity: HIGH
baseScore: 7.5
vectorString: 3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULMON: CVE-2020-8616 // JVNDB: JVNDB-2020-000036 // JVNDB: JVNDB-2020-004591 // JVNDB: JVNDB-2020-004591 // CNNVD: CNNVD-202005-917 // NVD: CVE-2020-8616 // NVD: CVE-2020-8616

PROBLEMTYPE DATA

problemtype:CWE-400

Trust: 1.0

problemtype:CWE-Other

Trust: 0.8

sources: JVNDB: JVNDB-2020-000036 // NVD: CVE-2020-8616

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202005-917

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-202005-917

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-000036

PATCH

title:CVE-2020-8616 (NXNSAttack) についてurl:https://xack.co.jp/info/?ID=622

Trust: 0.8

title:CVE-2020-8616: BIND does not sufficiently limit the number of fetches performed when processing referralsurl:https://kb.isc.org/docs/cve-2020-8616

Trust: 0.8

title:CVE-2020-8617: A logic error in code which checks TSIG validity can be used to trigger an assertion failure in tsig.curl:https://kb.isc.org/docs/cve-2020-8617

Trust: 0.8

title:ISC BIND Remediation of resource management error vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=119356

Trust: 0.6

title:Red Hat: Important: bind security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20203433 - Security Advisory

Trust: 0.1

title:Red Hat: Important: bind security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202383 - Security Advisory

Trust: 0.1

title:Ubuntu Security Notice: bind9 vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-4365-1

Trust: 0.1

title:Red Hat: Important: bind security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20203272 - Security Advisory

Trust: 0.1

title:Red Hat: Important: bind security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20203470 - Security Advisory

Trust: 0.1

title:Red Hat: Important: bind security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202404 - Security Advisory

Trust: 0.1

title:Red Hat: Important: bind security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20203471 - Security Advisory

Trust: 0.1

title:Red Hat: Important: bind security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20203379 - Security Advisory

Trust: 0.1

title:Red Hat: Important: bind security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202345 - Security Advisory

Trust: 0.1

title:Red Hat: Important: bind security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202338 - Security Advisory

Trust: 0.1

title:Ubuntu Security Notice: bind9 vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-4365-2

Trust: 0.1

title:Red Hat: Important: bind security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20203475 - Security Advisory

Trust: 0.1

title:Red Hat: Important: bind security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202344 - Security Advisory

Trust: 0.1

title:Red Hat: Important: bind security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20203378 - Security Advisory

Trust: 0.1

title:Debian CVElist Bug Report Logs: bind9: CVE-2020-8616 CVE-2020-8617url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=381e66e05d75d93918e55cdaa636e1b0

Trust: 0.1

title:Debian Security Advisories: DSA-4689-1 bind9 -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=808ccb545c64882f6cfa960abf75abfa

Trust: 0.1

title:Red Hat: Moderate: OpenShift Container Platform 4.4.8 openshift-enterprise-hyperkube-container security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202449 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: OpenShift Container Platform 4.2.36 ose-machine-config-operator-container security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202595 - Security Advisory

Trust: 0.1

title:Amazon Linux AMI: ALAS-2020-1369url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2020-1369

Trust: 0.1

title:Red Hat: Moderate: OpenShift Container Platform 4.3.25 openshift-enterprise-hyperkube-container security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202441 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: OpenShift Container Platform 4.3.25 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202439 - Security Advisory

Trust: 0.1

title:Arch Linux Issues: url:https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2020-8616 log

Trust: 0.1

title:Arch Linux Advisories: [ASA-202005-13] bind: denial of serviceurl:https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories&qid=ASA-202005-13

Trust: 0.1

title:Amazon Linux 2: ALAS2-2020-1426url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2020-1426

Trust: 0.1

title:IBM: Security Bulletin: Multiple vulnerabilities affect IBM Cloud Object Storage Systems (July 2020v1)url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=4ca8040b949152189bea3a3126afcd39

Trust: 0.1

title:Red Hat: Important: Container-native Virtualization security, bug fix, and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20203194 - Security Advisory

Trust: 0.1

title: - url:https://github.com/pexip/os-bind9-libs

Trust: 0.1

sources: VULMON: CVE-2020-8616 // JVNDB: JVNDB-2020-000036 // JVNDB: JVNDB-2020-004591 // CNNVD: CNNVD-202005-917

EXTERNAL IDS

db:NVDid:CVE-2020-8616

Trust: 4.0

db:OPENWALLid:OSS-SECURITY/2020/05/19/4

Trust: 1.7

db:JVNDBid:JVNDB-2020-000036

Trust: 1.4

db:JVNid:JVN40208370

Trust: 0.8

db:JVNid:JVNVU92065932

Trust: 0.8

db:JVNDBid:JVNDB-2020-004591

Trust: 0.8

db:PACKETSTORMid:158908

Trust: 0.7

db:PACKETSTORMid:158720

Trust: 0.7

db:PACKETSTORMid:158806

Trust: 0.7

db:AUSCERTid:ESB-2020.1932

Trust: 0.6

db:AUSCERTid:ESB-2020.3522

Trust: 0.6

db:AUSCERTid:ESB-2020.2744

Trust: 0.6

db:AUSCERTid:ESB-2020.2593

Trust: 0.6

db:AUSCERTid:ESB-2021.0174

Trust: 0.6

db:AUSCERTid:ESB-2020.1820

Trust: 0.6

db:AUSCERTid:ESB-2020.2267

Trust: 0.6

db:AUSCERTid:ESB-2020.1893.4

Trust: 0.6

db:AUSCERTid:ESB-2020.1777

Trust: 0.6

db:AUSCERTid:ESB-2020.1886

Trust: 0.6

db:AUSCERTid:ESB-2020.1905

Trust: 0.6

db:AUSCERTid:ESB-2020.1777.2

Trust: 0.6

db:AUSCERTid:ESB-2020.1893.5

Trust: 0.6

db:AUSCERTid:ESB-2020.2649

Trust: 0.6

db:AUSCERTid:ESB-2020.1975

Trust: 0.6

db:AUSCERTid:ESB-2020.2794

Trust: 0.6

db:AUSCERTid:ESB-2020.2108

Trust: 0.6

db:AUSCERTid:ESB-2020.2833

Trust: 0.6

db:PACKETSTORMid:157921

Trust: 0.6

db:PACKETSTORMid:158276

Trust: 0.6

db:PACKETSTORMid:157784

Trust: 0.6

db:PACKETSTORMid:157759

Trust: 0.6

db:PACKETSTORMid:157864

Trust: 0.6

db:PACKETSTORMid:157890

Trust: 0.6

db:PACKETSTORMid:158844

Trust: 0.6

db:PACKETSTORMid:158134

Trust: 0.6

db:NSFOCUSid:48083

Trust: 0.6

db:CNNVDid:CNNVD-202005-917

Trust: 0.6

db:VULMONid:CVE-2020-8616

Trust: 0.1

db:PACKETSTORMid:168830

Trust: 0.1

db:PACKETSTORMid:158805

Trust: 0.1

db:PACKETSTORMid:158130

Trust: 0.1

db:PACKETSTORMid:158131

Trust: 0.1

sources: VULMON: CVE-2020-8616 // JVNDB: JVNDB-2020-000036 // JVNDB: JVNDB-2020-004591 // PACKETSTORM: 168830 // PACKETSTORM: 158805 // PACKETSTORM: 158908 // PACKETSTORM: 158130 // PACKETSTORM: 158131 // PACKETSTORM: 158720 // PACKETSTORM: 158806 // CNNVD: CNNVD-202005-917 // NVD: CVE-2020-8616

REFERENCES

url:https://usn.ubuntu.com/4365-1/

Trust: 1.8

url:http://www.nxnsattack.com

Trust: 1.7

url:https://kb.isc.org/docs/cve-2020-8616

Trust: 1.7

url:http://www.openwall.com/lists/oss-security/2020/05/19/4

Trust: 1.7

url:https://www.debian.org/security/2020/dsa-4689

Trust: 1.7

url:https://security.netapp.com/advisory/ntap-20200522-0002/

Trust: 1.7

url:https://usn.ubuntu.com/4365-2/

Trust: 1.7

url:https://www.synology.com/security/advisory/synology_sa_20_12

Trust: 1.7

url:https://lists.debian.org/debian-lts-announce/2020/05/msg00031.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html

Trust: 1.7

url:https://jprs.jp/tech/security/2020-05-20-bind9-vuln-processing-referrals.html

Trust: 1.6

url:http://www.nxnsattack.com/

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2020-8616

Trust: 1.3

url:https://access.redhat.com/security/cve/cve-2020-8616

Trust: 1.2

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/jkjxvbokz36er3eucr7vrb7wghiimpnj/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/wogcjs2xq3sqnf4w6glz73lwzj6zzwzi/

Trust: 1.0

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-5591

Trust: 0.8

url:https://jvn.jp/jp/jvn40208370/index.html

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-8616

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-8617

Trust: 0.8

url:http://jvn.jp/cert/jvnvu92065932

Trust: 0.8

url:https://jprs.jp/tech/security/2020-05-20-bind9-vuln-tsig.html

Trust: 0.8

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/wogcjs2xq3sqnf4w6glz73lwzj6zzwzi/

Trust: 0.7

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/jkjxvbokz36er3eucr7vrb7wghiimpnj/

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2020-8617

Trust: 0.6

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.6

url:https://bugzilla.redhat.com/):

Trust: 0.6

url:https://access.redhat.com/security/team/contact/

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-bind-affect-aix-cve-2020-8616-and-cve-2020-8617/

Trust: 0.6

url:https://packetstormsecurity.com/files/158134/red-hat-security-advisory-2020-2449-01.html

Trust: 0.6

url:https://packetstormsecurity.com/files/158908/red-hat-security-advisory-2020-3475-01.html

Trust: 0.6

url:https://jvndb.jvn.jp/en/contents/2020/jvndb-2020-000036.html

Trust: 0.6

url:https://packetstormsecurity.com/files/158844/red-hat-security-advisory-2020-3433-01.html

Trust: 0.6

url:https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20200826-01-ddos-cn

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2267/

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-bind-for-ibm-i-is-affected-by-cve-2020-8616-and-cve-2020-8617/

Trust: 0.6

url:https://packetstormsecurity.com/files/158806/red-hat-security-advisory-2020-3379-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2794/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.1893.4/

Trust: 0.6

url:https://packetstormsecurity.com/files/158720/red-hat-security-advisory-2020-3272-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2744/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2833/

Trust: 0.6

url:http://www.nsfocus.net/vulndb/48083

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2108/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2649/

Trust: 0.6

url:https://packetstormsecurity.com/files/157921/red-hat-security-advisory-2020-2383-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.1932/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.1777.2/

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-publicly-disclosed-vulnerabilities-from-bind-affect-ibm-netezza-host-management/

Trust: 0.6

url:https://media.cert.europa.eu/static/securityadvisories/2020/cert-eu-sa2020-027.pdf

Trust: 0.6

url:https://vigilance.fr/vulnerability/isc-bind-two-vulnerabilities-32300

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-api-connect-v10-is-impacted-by-denial-of-service-vulnerabilities-in-crunchy-kernel-cve-2020-8616-cve-2020-8617/

Trust: 0.6

url:https://packetstormsecurity.com/files/157759/ubuntu-security-notice-usn-4365-1.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2593/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.1893.5/

Trust: 0.6

url:https://packetstormsecurity.com/files/157864/red-hat-security-advisory-2020-2338-01.html

Trust: 0.6

url:https://packetstormsecurity.com/files/157784/ubuntu-security-notice-usn-4365-2.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0174/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.1905/

Trust: 0.6

url:https://packetstormsecurity.com/files/157890/red-hat-security-advisory-2020-2345-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.1777/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.1820/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.1886/

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-bind-cve-2020-8616-and-cve-2020-8617/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.3522/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.1975/

Trust: 0.6

url:https://packetstormsecurity.com/files/158276/red-hat-security-advisory-2020-2595-01.html

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-bind-affects-ibm-integrated-analytics-system/

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2020-8617

Trust: 0.5

url:https://access.redhat.com/security/team/key/

Trust: 0.4

url:https://access.redhat.com/articles/11258

Trust: 0.4

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.4

url:https://docs.openshift.com/container-platform/4.3/updating/updating-cluster

Trust: 0.2

url:https://docs.openshift.com/container-platform/4.3/release_notes/ocp-4-3-rel

Trust: 0.2

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/400.html

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:3433

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://security.archlinux.org/cve-2020-8616

Trust: 0.1

url:https://www.debian.org/security/faq

Trust: 0.1

url:https://www.debian.org/security/

Trust: 0.1

url:https://security-tracker.debian.org/tracker/bind9

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-6477

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:3378

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:3475

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:2439

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-1750

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-1750

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-8555

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:2441

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-8555

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:3272

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:3379

Trust: 0.1

sources: VULMON: CVE-2020-8616 // JVNDB: JVNDB-2020-000036 // JVNDB: JVNDB-2020-004591 // PACKETSTORM: 168830 // PACKETSTORM: 158805 // PACKETSTORM: 158908 // PACKETSTORM: 158130 // PACKETSTORM: 158131 // PACKETSTORM: 158720 // PACKETSTORM: 158806 // CNNVD: CNNVD-202005-917 // NVD: CVE-2020-8616

CREDITS

Red Hat

Trust: 1.2

sources: PACKETSTORM: 158805 // PACKETSTORM: 158908 // PACKETSTORM: 158130 // PACKETSTORM: 158131 // PACKETSTORM: 158720 // PACKETSTORM: 158806 // CNNVD: CNNVD-202005-917

SOURCES

db:VULMONid:CVE-2020-8616
db:JVNDBid:JVNDB-2020-000036
db:JVNDBid:JVNDB-2020-004591
db:PACKETSTORMid:168830
db:PACKETSTORMid:158805
db:PACKETSTORMid:158908
db:PACKETSTORMid:158130
db:PACKETSTORMid:158131
db:PACKETSTORMid:158720
db:PACKETSTORMid:158806
db:CNNVDid:CNNVD-202005-917
db:NVDid:CVE-2020-8616

LAST UPDATE DATE

2025-05-04T21:52:14.742000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2020-8616date:2020-10-20T00:00:00
db:JVNDBid:JVNDB-2020-000036date:2020-06-05T00:00:00
db:JVNDBid:JVNDB-2020-004591date:2020-05-21T00:00:00
db:CNNVDid:CNNVD-202005-917date:2021-01-15T00:00:00
db:NVDid:CVE-2020-8616date:2024-11-21T05:39:07.857

SOURCES RELEASE DATE

db:VULMONid:CVE-2020-8616date:2020-05-19T00:00:00
db:JVNDBid:JVNDB-2020-000036date:2020-06-05T00:00:00
db:JVNDBid:JVNDB-2020-004591date:2020-05-21T00:00:00
db:PACKETSTORMid:168830date:2020-05-28T19:12:00
db:PACKETSTORMid:158805date:2020-08-10T14:26:57
db:PACKETSTORMid:158908date:2020-08-18T16:40:06
db:PACKETSTORMid:158130date:2020-06-17T21:44:50
db:PACKETSTORMid:158131date:2020-06-17T21:45:27
db:PACKETSTORMid:158720date:2020-08-03T17:14:20
db:PACKETSTORMid:158806date:2020-08-10T14:27:06
db:CNNVDid:CNNVD-202005-917date:2020-05-19T00:00:00
db:NVDid:CVE-2020-8616date:2020-05-19T14:15:11.877