An attacker who is permitted to send zone data to a server via zone transfer can exploit this to intentionally trigger the assertion failure with a specially constructed zone, denying service to clients.
Solution:
Workaround:
The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary.
Link | Tags |
---|---|
https://kb.isc.org/docs/cve-2020-8618 | vendor advisory |
https://security.netapp.com/advisory/ntap-20200625-0003/ | third party advisory |
https://usn.ubuntu.com/4399-1/ | third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html | vendor advisory mailing list third party advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html | vendor advisory mailing list third party advisory |