A malicious actor who intentionally exploits this lack of effective limitation on the number of fetches performed when processing referrals can, through the use of specially crafted referrals, cause a recursing server to issue a very large number of fetches in an attempt to process the referral. This has at least two potential effects: The performance of the recursing server can potentially be degraded by the additional work required to perform these fetches, and The attacker can exploit this behavior to use the recursing server as a reflector in a reflection attack with a high amplification factor.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 05:39
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html - | |
References | () http://www.nxnsattack.com - Exploit, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2020/05/19/4 - Mailing List, Patch, Third Party Advisory | |
References | () https://kb.isc.org/docs/cve-2020-8616 - Patch, Vendor Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2020/05/msg00031.html - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JKJXVBOKZ36ER3EUCR7VRB7WGHIIMPNJ/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WOGCJS2XQ3SQNF4W6GLZ73LWZJ6ZZWZI/ - | |
References | () https://security.netapp.com/advisory/ntap-20200522-0002/ - | |
References | () https://usn.ubuntu.com/4365-1/ - | |
References | () https://usn.ubuntu.com/4365-2/ - | |
References | () https://www.debian.org/security/2020/dsa-4689 - Third Party Advisory | |
References | () https://www.synology.com/security/advisory/Synology_SA_20_12 - |
07 Nov 2023, 03:26
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2020-05-19 14:15
Updated : 2024-11-21 05:39
NVD link : CVE-2020-8616
Mitre link : CVE-2020-8616
CVE.ORG link : CVE-2020-8616
JSON object : View
Products Affected
isc
- bind
debian
- debian_linux
CWE
CWE-400
Uncontrolled Resource Consumption