ASA-202005-13 log generated external raw
[ASA-202005-13] bind: denial of service |
---|
Arch Linux Security Advisory ASA-202005-13
==========================================
Severity: High
Date : 2020-05-20
CVE-ID : CVE-2020-8616 CVE-2020-8617
Package : bind
Type : denial of service
Remote : Yes
Link : https://security.archlinux.org/AVG-1165
Summary
=======
The package bind before version 9.16.3-1 is vulnerable to denial of
service.
Resolution
==========
Upgrade to 9.16.3-1.
# pacman -Syu "bind>=9.16.3-1"
The problems have been fixed upstream in version 9.16.3.
Workaround
==========
None.
Description
===========
- CVE-2020-8616 (denial of service)
An issue has been found in bind before 9.16.3, which does not
sufficiently limit the number of fetches which may be performed while
processing a referral response. A malicious actor who intentionally
exploits this lack of effective limitation on the number of fetches
performed when processing referrals can, through the use of specially
crafted referrals, cause a recursing server to issue a very large
number of fetches in an attempt to process the referral. This has at
least two potential effects: the performance of the recursing server
can potentially be degraded by the additional work required to perform
these fetches, and the attacker can exploit this behavior to use the
recursing server as a reflector in a reflection attack with a high
amplification factor.
- CVE-2020-8617 (denial of service)
An error in bind before 9.16.3 in the code which checks the validity of
messages containing TSIG resource records can be exploited by an
attacker to trigger an assertion failure in tsig.c, resulting in denial
of service to clients.
Impact
======
A remote attacker can use the recursor has an amplification vector to
cause a denial of service via a crafted reply. In addition, a remote
attacker can crash the application by guessing the TSIG key name.
References
==========
https://kb.isc.org/docs/cve-2020-8616
https://kb.isc.org/docs/cve-2020-8617
https://kb.isc.org/docs/cve-2020-8617-faq-and-supplemental-information
http://www.nxnsattack.com/
https://security.archlinux.org/CVE-2020-8616
https://security.archlinux.org/CVE-2020-8617
|