TROYANOSYVIRUS
Volver a CVEs

CVE-2020-8625

HIGH
8.1

Descripcion

BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting valid values for the tkey-gssapi-keytab or tkey-gssapi-credentialconfiguration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. The most likely outcome of a successful exploitation of the vulnerability is a crash of the named process. However, remote code execution, while unproven, is theoretically possible. Affects: BIND 9.5.0 -> 9.11.27, 9.12.0 -> 9.16.11, and versions BIND 9.11.3-S1 -> 9.11.27-S1 and 9.16.8-S1 -> 9.16.11-S1 of BIND Supported Preview Edition. Also release versions 9.17.0 -> 9.17.1 of the BIND 9.17 development branch

Detalles CVE

Puntuacion CVSS v3.18.1
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadHIGH
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado2/17/2021
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0

Productos afectados

debian:debian_linuxfedoraproject:fedoraisc:bindnetapp:500fnetapp:500f_firmwarenetapp:a250netapp:a250_firmwarenetapp:cloud_backupsiemens:sinec_infrastructure_network_services

Debilidades (CWE)

CWE-120

Referencias

http://www.openwall.com/lists/oss-security/2021/02/19/1(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2021/02/20/2(af854a3a-2127-422b-91ae-364da2661108)
https://kb.isc.org/v1/docs/cve-2020-8625(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20210319-0001/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2021/dsa-4857(af854a3a-2127-422b-91ae-364da2661108)
https://www.zerodayinitiative.com/advisories/ZDI-21-195/(af854a3a-2127-422b-91ae-364da2661108)

Correlaciones IOC

Sin correlaciones registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.