Lucene search

K
freebsdFreeBSDF00D1873-B138-11EA-8659-901B0EF719AB
HistoryJun 17, 2020 - 12:00 a.m.

BIND -- Remote Denial of Service vulnerability

2020-06-1700:00:00
vuxml.freebsd.org
16

4.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:N/I:N/A:P

0.003 Low

EPSS

Percentile

70.2%

ISC reports:

The asterisk character (“*”) is allowed in DNS zone files, where
it is most commonly present as a wildcard at a terminal node of
the Domain Name System graph. However, the RFCs do not require
and BIND does not enforce that an asterisk character be present
only at a terminal node.
A problem can occur when an asterisk is present in an empty
non-terminal location within the DNS graph. If such a node exists,
after a series of queries, named can reach an inconsistent state
that results in the failure of an assertion check in rbtdb.c,
followed by the program exiting due to the assertion failure.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchbind911= 9.11.14UNKNOWN
FreeBSDanynoarchbind911< 9.11.20UNKNOWN
FreeBSDanynoarchbind916= 9.16.0UNKNOWN
FreeBSDanynoarchbind916< 9.16.4UNKNOWN

4.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:N/I:N/A:P

0.003 Low

EPSS

Percentile

70.2%