In BIND 9.15.6 -> 9.16.5, 9.17.0 -> 9.17.3, An attacker who can establish a TCP connection with the server and send data on that connection can exploit this to trigger the assertion failure, causing the server to exit.
Solution:
Workaround:
The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary.
Link | Tags |
---|---|
https://kb.isc.org/docs/cve-2020-8620 | vendor advisory |
https://security.netapp.com/advisory/ntap-20200827-0003/ | third party advisory |
https://usn.ubuntu.com/4468-1/ | third party advisory vendor advisory |
https://security.gentoo.org/glsa/202008-19 | third party advisory vendor advisory |
https://www.synology.com/security/advisory/Synology_SA_20_19 | third party advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html | third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html | third party advisory vendor advisory |