CVE-2020-8625

Description from NVD

BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting valid values for the tkey-gssapi-keytab or tkey-gssapi-credentialconfiguration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. The most likely outcome of a successful exploitation of the vulnerability is a crash of the named process. However, remote code execution, while unproven, is theoretically possible. Affects: BIND 9.5.0 -> 9.11.27, 9.12.0 -> 9.16.11, and versions BIND 9.11.3-S1 -> 9.11.27-S1 and 9.16.8-S1 -> 9.16.11-S1 of BIND Supported Preview Edition. Also release versions 9.17.0 -> 9.17.1 of the BIND 9.17 development branch

Information Acquisition Date:2021-04-27T11:05Z
CVSS 2.0: 6.8 MEDIUM CVSS 3.x: 8.1 HIGH

▼ CVSS3 Vec CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

▼ CVSS2 Vec AV:N/AC:M/Au:N/C:P/I:P/A:P

NVD References

 https://kb.isc.org/v1/docs/cve-2020-8625
     source:CONFIRM
     tags:Mitigation    Vendor Advisory    
 DSA-4857
     source:DEBIAN
     tags:Third Party Advisory    
 [oss-security] 20210218 BIND Operational Notification: Enabling the new BIND option "stale-answer-client-timeout" can result in unexpected server termination
     source:MLIST
     tags:Mailing List    Patch    Third Party Advisory    
 [debian-lts-announce] 20210219 [SECURITY] [DLA 2568-1] bind9 security update
     source:MLIST
     tags:Mailing List    Third Party Advisory    
 [oss-security] 20210220 BIND Operational Notification: Zone journal (.jnl) file incompatibility,after upgrading to BIND 9.16.12 and 9.17
     source:MLIST
     tags:Mailing List    Patch    Third Party Advisory    
 https://www.zerodayinitiative.com/advisories/ZDI-21-195/
     source:MISC
     tags:Third Party Advisory    VDB Entry    
 FEDORA-2021-0595625865
     source:FEDORA
     tags:Mailing List    Third Party Advisory    
 FEDORA-2021-28f97e232d
     source:FEDORA
     tags:Mailing List    Third Party Advisory    
 https://security.netapp.com/advisory/ntap-20210319-0001/
     source:CONFIRM
     tags:
 FEDORA-2021-8b4744f152
     source:FEDORA
     tags:

Refer to Information on External Sites

CVE InfomationExploits or more Infomation
mitreEXPLOIT DATABASE
NVD0day.today
vulmon.comgithub
CVE DetailsTwitter
JVN ENG JPN
Reconshell

Software Tag: Linux(1 tweets)



List of frequently cited URLs

URLNum of Times Referred to
https://git756
https://twitter.com/JPRS_official/status/13622304907621539847
https://www.jpcert.or.jp/at/2021/at210010.html7
http://security.sios.com7
https://www.thezdi.com/blog/2021/2/24/cve-2020-8625-a-fifte...5
https://jprs.jp/tech/security/2021-02-18-bind9-vuln-gsstsig...3
https://kb.isc.org/docs/cve-2020-86253

Information from Twitter

User URL Info Source Date
cpomagazine https://www.cpomagazine.com/cyber-security/fifteen-year-old... Source cpomagazine      1635265606097223680 2023/03/13

List of frequently cited URLs

URLNum of Times Referred to
git756
twitter.com7
www.jpcert.or.jp7
security.sios.com7
www.thezdi.com5
jprs.jp3
kb.isc.org3

Information from Twitter

User URL Info Source
cpomagazine cpomagazine.com Show Tweet

GitHub Search Results: Up to 10
NameURL
No Data

GitHub Search Results: Up to 10
NameURL
No Data

2023/03/13 Score : 0
Added Har-sia Database : 2021/02/18
Last Modified : 2023/03/13
Highest Scored Date : 2021/02/18
Highest Score : 43