Lucene search

K
ubuntucveUbuntu.comUB:CVE-2020-8625
HistoryFeb 17, 2021 - 12:00 a.m.

CVE-2020-8625

2021-02-1700:00:00
ubuntu.com
ubuntu.com
21

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.187 Low

EPSS

Percentile

96.2%

BIND servers are vulnerable if they are running an affected version and are
configured to use GSS-TSIG features. In a configuration which uses BIND’s
default settings the vulnerable code path is not exposed, but a server can
be rendered vulnerable by explicitly setting valid values for the
tkey-gssapi-keytab or tkey-gssapi-credentialconfiguration options. Although
the default configuration is not vulnerable, GSS-TSIG is frequently used in
networks where BIND is integrated with Samba, as well as in mixed-server
environments that combine BIND servers with Active Directory domain
controllers. The most likely outcome of a successful exploitation of the
vulnerability is a crash of the named process. However, remote code
execution, while unproven, is theoretically possible. Affects: BIND 9.5.0
-> 9.11.27, 9.12.0 -> 9.16.11, and versions BIND 9.11.3-S1 -> 9.11.27-S1
and 9.16.8-S1 -> 9.16.11-S1 of BIND Supported Preview Edition. Also release
versions 9.17.0 -> 9.17.1 of the BIND 9.17 development branch

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchbind9< 1:9.11.3+dfsg-1ubuntu1.14UNKNOWN
ubuntu20.04noarchbind9< 1:9.16.1-0ubuntu2.6UNKNOWN
ubuntu20.10noarchbind9< 1:9.16.6-3ubuntu1.1UNKNOWN
ubuntu14.04noarchbind9< 1:9.9.5.dfsg-3ubuntu0.19+esm4) Available with Ubuntu Pro or Ubuntu Pro (Infra-onlyUNKNOWN
ubuntu16.04noarchbind9< 1:9.10.3.dfsg.P4-8ubuntu1.18UNKNOWN

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.187 Low

EPSS

Percentile

96.2%