CVE-2020-8619

Description from NVD

In ISC BIND9 versions BIND 9.11.14 -> 9.11.19, BIND 9.14.9 -> 9.14.12, BIND 9.16.0 -> 9.16.3, BIND Supported Preview Edition 9.11.14-S1 -> 9.11.19-S1: Unless a nameserver is providing authoritative service for one or more zones and at least one zone contains an empty non-terminal entry containing an asterisk ("*") character, this defect cannot be encountered. A would-be attacker who is allowed to change zone content could theoretically introduce such a record in order to exploit this condition to cause denial of service, though we consider the use of this vector unlikely because any such attack would require a significant privilege level and be easily traceable.

Information Acquisition Date:2021-04-27T10:45Z
CVSS 2.0: 4.0 MEDIUM CVSS 3.x: 4.9 MEDIUM

▼ CVSS3 Vec CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

▼ CVSS2 Vec AV:N/AC:L/Au:S/C:N/I:N/A:P

NVD References

 https://kb.isc.org/docs/cve-2020-8619
     source:CONFIRM
     tags:Vendor Advisory    
 FEDORA-2020-54a91444ff
     source:FEDORA
     tags:Third Party Advisory    
 https://security.netapp.com/advisory/ntap-20200625-0003/
     source:CONFIRM
     tags:
 FEDORA-2020-5f8da4b260
     source:FEDORA
     tags:
 USN-4399-1
     source:UBUNTU
     tags:
 DSA-4752
     source:DEBIAN
     tags:
 openSUSE-SU-2020:1699
     source:SUSE
     tags:
 openSUSE-SU-2020:1701
     source:SUSE
     tags:

Refer to Information on External Sites

CVE InfomationExploits or more Infomation
mitreEXPLOIT DATABASE
NVD0day.today
vulmon.comgithub
CVE DetailsTwitter
JVN ENG JPN
Reconshell

Software Tag: BIND(4 tweets) Linux(2 tweets)



List of frequently cited URLs

URLNum of Times Referred to
https://www.jpcert.or.jp/newsflash/2020061801.html7
https://jprs.jp/tech/security/2020-06-18-bind9-vuln-asteris...5
https://security.sios.com/vulnerability/bind-security-vulne...5
https://kb.isc.org/docs/cve-2020-86193
https://twitter.com/JPRS_official/status/12734441553440808963

Information from Twitter

User URL Info Source Date
threatintelctr https://nvd.nist.gov/vuln/detail/CVE-2020-8619 Source threatintelctr   1578410364550713344 2022/10/08
RemotelyAlerts http://alerts.remotelyrmm.com/CVE-2020-8619 Source RemotelyAlerts   1578422367243468807 2022/10/08
WolfgangSesin http://www.sesin.at Source WolfgangSesin    1578422675499802624 2022/10/08
WolfgangSesin https://www.sesin.at/2022/10/07/cve-2020-8619-bind-debian_l... Source WolfgangSesin    1578422675499802624 2022/10/08
www_sesin_at http://www.sesin.at Source www_sesin_at     1578422679882944514 2022/10/08
www_sesin_at https://www.sesin.at/2022/10/07/cve-2020-8619-bind-debian_l... Source www_sesin_at     1578422679882944514 2022/10/08

List of frequently cited URLs

URLNum of Times Referred to
www.jpcert.or.jp7
jprs.jp5
security.sios.com5
kb.isc.org3
twitter.com3

Information from Twitter

User URL Info Source
threatintelctr nvd.nist.gov Show Tweet
RemotelyAlerts alerts.remotelyrmm.com Show Tweet
WolfgangSesin sesin.at Show Tweet
WolfgangSesin sesin.at Show Tweet
www_sesin_at sesin.at Show Tweet
www_sesin_at sesin.at Show Tweet

GitHub Search Results: Up to 10
NameURL
No Data

GitHub Search Results: Up to 10
NameURL
No Data

2022/10/08 Score : 4
Added Har-sia Database : 2020/06/18
Last Modified : 2022/10/08
Highest Scored Date : 2020/06/18
Highest Score : 41