CVE-2020-8625

MEDIUM

Description

BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting valid values for the tkey-gssapi-keytab or tkey-gssapi-credentialconfiguration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. The most likely outcome of a successful exploitation of the vulnerability is a crash of the named process. However, remote code execution, while unproven, is theoretically possible. Affects: BIND 9.5.0 -> 9.11.27, 9.12.0 -> 9.16.11, and versions BIND 9.11.3-S1 -> 9.11.27-S1 and 9.16.8-S1 -> 9.16.11-S1 of BIND Supported Preview Edition. Also release versions 9.17.0 -> 9.17.1 of the BIND 9.17 development branch

References

http://www.openwall.com/lists/oss-security/2021/02/19/1

http://www.openwall.com/lists/oss-security/2021/02/20/2

https://kb.isc.org/v1/docs/cve-2020-8625

https://lists.debian.org/debian-lts-announce/2021/02/msg00029.html

https://lists.fedoraproject.org/archives/list/[email protected]/message/EBTPWRQWRQEJNWY4NHO4WLS4KLJ3ERHZ/

https://lists.fedoraproject.org/archives/list/[email protected]/message/KYXAF7G45RXDVNUTWWCI2CVTHRZ67LST/

https://lists.fedoraproject.org/archives/list/[email protected]/message/QWCMBOSZOJIIET7BWTRYS3HLX5TSDKHX/

https://security.netapp.com/advisory/ntap-20210319-0001/

https://www.debian.org/security/2021/dsa-4857

https://www.zerodayinitiative.com/advisories/ZDI-21-195/

Details

Source: MITRE

Published: 2021-02-17

Updated: 2021-03-19

Type: CWE-120

Risk Information

CVSS v2.0

Base Score: 6.8

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 8.6

Severity: MEDIUM

CVSS v3.0

Base Score: 8.1

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Impact Score: 5.9

Exploitability Score: 2.2

Severity: HIGH

Tenable Plugins

View all (33 total)

IDNameProductFamilySeverity
149096EulerOS 2.0 SP3 : bind (EulerOS-SA-2021-1766)NessusHuawei Local Security Checks
medium
148611EulerOS Virtualization 2.9.1 : bind (EulerOS-SA-2021-1725)NessusHuawei Local Security Checks
medium
148575EulerOS Virtualization 2.9.0 : bind (EulerOS-SA-2021-1739)NessusHuawei Local Security Checks
medium
148006Ubuntu 16.04 LTS / 18.04 LTS / 20.04 LTS / 20.10 : Bind vulnerability (USN-4737-1)NessusUbuntu Local Security Checks
medium
147916Amazon Linux AMI : bind (ALAS-2021-1485)NessusAmazon Linux Local Security Checks
medium
147913Amazon Linux 2 : bind (ALAS-2021-1614)NessusAmazon Linux Local Security Checks
medium
147869Oracle Linux 6 : bind (ELSA-2021-9117)NessusOracle Linux Local Security Checks
medium
147867RHEL 8 : bind (RHSA-2021:0922)NessusRed Hat Local Security Checks
medium
147822Photon OS 1.0: Bindutils PHSA-2021-1.0-0370NessusPhotonOS Local Security Checks
medium
147820Photon OS 3.0: Bindutils PHSA-2021-3.0-0207NessusPhotonOS Local Security Checks
medium
147819Photon OS 2.0: Bindutils PHSA-2021-2.0-0328NessusPhotonOS Local Security Checks
medium
147614EulerOS Virtualization for ARM 64 3.0.2.0 : bind (EulerOS-SA-2021-1396)NessusHuawei Local Security Checks
medium
147149openSUSE Security Update : bind (openSUSE-2021-375)NessusSuSE Local Security Checks
medium
147135Scientific Linux Security Update : bind on SL7.x i686/x86_64 (2021:0671)NessusScientific Linux Local Security Checks
medium
147116Fedora 32 : 32:bind (2021-0595625865)NessusFedora Local Security Checks
medium
147087Fedora 33 : 32:bind (2021-28f97e232d)NessusFedora Local Security Checks
medium
147023RHEL 7 : bind (RHSA-2021:0727)NessusRed Hat Local Security Checks
medium
147018RHEL 7 : bind (RHSA-2021:0693)NessusRed Hat Local Security Checks
medium
147017RHEL 7 : bind (RHSA-2021:0692)NessusRed Hat Local Security Checks
medium
147016RHEL 7 : bind (RHSA-2021:0694)NessusRed Hat Local Security Checks
medium
147014RHEL 7 : bind (RHSA-2021:0691)NessusRed Hat Local Security Checks
medium
146958CentOS 7 : bind (CESA-2021:0671)NessusCentOS Local Security Checks
medium
146934Oracle Linux 7 : bind (ELSA-2021-0671)NessusOracle Linux Local Security Checks
medium
146933Oracle Linux 8 : SUMM: / bind (ELSA-2021-0670)NessusOracle Linux Local Security Checks
medium
146931RHEL 7 : bind (RHSA-2021:0671)NessusRed Hat Local Security Checks
medium
146930RHEL 8 : bind (RHSA-2021:0669)NessusRed Hat Local Security Checks
medium
146929RHEL 8 : bind (RHSA-2021:0670)NessusRed Hat Local Security Checks
medium
146736Debian DLA-2568-1 : bind9 security updateNessusDebian Local Security Checks
medium
146615SUSE SLED15 / SLES15 Security Update : bind (SUSE-SU-2021:0507-1)NessusSuSE Local Security Checks
medium
146603Debian DSA-4857-1 : bind9 - security updateNessusDebian Local Security Checks
medium
146600SUSE SLES12 Security Update : bind (SUSE-SU-2021:0503-1)NessusSuSE Local Security Checks
medium
146597SUSE SLES12 Security Update : bind (SUSE-SU-2021:0504-1)NessusSuSE Local Security Checks
medium
146595ISC BIND Buffer Overflow (CVE-2020-8625)NessusDNS
medium