CVE-2020-8616

A malicious actor who intentionally exploits this lack of effective limitation on the number of fetches performed when processing referrals can, through the use of specially crafted referrals, cause a recursing server to issue a very large number of fetches in an attempt to process the referral. This has at least two potential effects: The performance of the recursing server can potentially be degraded by the additional work required to perform these fetches, and The attacker can exploit this behavior to use the recursing server as a reflector in a reflection attack with a high amplification factor.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html
http://www.nxnsattack.com Exploit Third Party Advisory
http://www.openwall.com/lists/oss-security/2020/05/19/4 Mailing List Patch Third Party Advisory
https://kb.isc.org/docs/cve-2020-8616 Patch Vendor Advisory
https://lists.debian.org/debian-lts-announce/2020/05/msg00031.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JKJXVBOKZ36ER3EUCR7VRB7WGHIIMPNJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WOGCJS2XQ3SQNF4W6GLZ73LWZJ6ZZWZI/
https://security.netapp.com/advisory/ntap-20200522-0002/
https://usn.ubuntu.com/4365-1/
https://usn.ubuntu.com/4365-2/
https://www.debian.org/security/2020/dsa-4689 Third Party Advisory
https://www.synology.com/security/advisory/Synology_SA_20_12
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html
http://www.nxnsattack.com Exploit Third Party Advisory
http://www.openwall.com/lists/oss-security/2020/05/19/4 Mailing List Patch Third Party Advisory
https://kb.isc.org/docs/cve-2020-8616 Patch Vendor Advisory
https://lists.debian.org/debian-lts-announce/2020/05/msg00031.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JKJXVBOKZ36ER3EUCR7VRB7WGHIIMPNJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WOGCJS2XQ3SQNF4W6GLZ73LWZJ6ZZWZI/
https://security.netapp.com/advisory/ntap-20200522-0002/
https://usn.ubuntu.com/4365-1/
https://usn.ubuntu.com/4365-2/
https://www.debian.org/security/2020/dsa-4689 Third Party Advisory
https://www.synology.com/security/advisory/Synology_SA_20_12
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.12.4:p1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.12.4:p2:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:isc:bind:9.9.3:s1:*:*:supported_preview:*:*:*
cpe:2.3:a:isc:bind:9.10.5:s1:*:*:supported_preview:*:*:*
cpe:2.3:a:isc:bind:9.10.7:s1:*:*:supported_preview:*:*:*
cpe:2.3:a:isc:bind:9.11.3:s1:*:*:supported_preview:*:*:*
cpe:2.3:a:isc:bind:9.11.5:s3:*:*:supported_preview:*:*:*
cpe:2.3:a:isc:bind:9.11.5:s5:*:*:supported_preview:*:*:*
cpe:2.3:a:isc:bind:9.11.6:s1:*:*:supported_preview:*:*:*
cpe:2.3:a:isc:bind:9.11.7:s1:*:*:supported_preview:*:*:*
cpe:2.3:a:isc:bind:9.11.8:s1:*:*:supported_preview:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

21 Nov 2024, 05:39

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html - () http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html -
References () http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html - () http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html -
References () http://www.nxnsattack.com - Exploit, Third Party Advisory () http://www.nxnsattack.com - Exploit, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2020/05/19/4 - Mailing List, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2020/05/19/4 - Mailing List, Patch, Third Party Advisory
References () https://kb.isc.org/docs/cve-2020-8616 - Patch, Vendor Advisory () https://kb.isc.org/docs/cve-2020-8616 - Patch, Vendor Advisory
References () https://lists.debian.org/debian-lts-announce/2020/05/msg00031.html - () https://lists.debian.org/debian-lts-announce/2020/05/msg00031.html -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JKJXVBOKZ36ER3EUCR7VRB7WGHIIMPNJ/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JKJXVBOKZ36ER3EUCR7VRB7WGHIIMPNJ/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WOGCJS2XQ3SQNF4W6GLZ73LWZJ6ZZWZI/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WOGCJS2XQ3SQNF4W6GLZ73LWZJ6ZZWZI/ -
References () https://security.netapp.com/advisory/ntap-20200522-0002/ - () https://security.netapp.com/advisory/ntap-20200522-0002/ -
References () https://usn.ubuntu.com/4365-1/ - () https://usn.ubuntu.com/4365-1/ -
References () https://usn.ubuntu.com/4365-2/ - () https://usn.ubuntu.com/4365-2/ -
References () https://www.debian.org/security/2020/dsa-4689 - Third Party Advisory () https://www.debian.org/security/2020/dsa-4689 - Third Party Advisory
References () https://www.synology.com/security/advisory/Synology_SA_20_12 - () https://www.synology.com/security/advisory/Synology_SA_20_12 -

07 Nov 2023, 03:26

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOGCJS2XQ3SQNF4W6GLZ73LWZJ6ZZWZI/', 'name': 'FEDORA-2020-2d89cbcfd9', 'tags': [], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JKJXVBOKZ36ER3EUCR7VRB7WGHIIMPNJ/', 'name': 'FEDORA-2020-f9dcd4e9d5', 'tags': [], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JKJXVBOKZ36ER3EUCR7VRB7WGHIIMPNJ/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WOGCJS2XQ3SQNF4W6GLZ73LWZJ6ZZWZI/ -

Information

Published : 2020-05-19 14:15

Updated : 2024-11-21 05:39


NVD link : CVE-2020-8616

Mitre link : CVE-2020-8616

CVE.ORG link : CVE-2020-8616


JSON object : View

Products Affected

isc

  • bind

debian

  • debian_linux
CWE
CWE-400

Uncontrolled Resource Consumption