ArchLinux: 202005-13: bind: denial of service

    Date 01 Jun 2020
    90
    Posted By LinuxSecurity Advisories
    The package bind before version 9.16.3-1 is vulnerable to denial of service.
    Arch Linux Security Advisory ASA-202005-13
    ==========================================
    
    Severity: High
    Date    : 2020-05-20
    CVE-ID  : CVE-2020-8616 CVE-2020-8617
    Package : bind
    Type    : denial of service
    Remote  : Yes
    Link    : https://security.archlinux.org/AVG-1165
    
    Summary
    =======
    
    The package bind before version 9.16.3-1 is vulnerable to denial of
    service.
    
    Resolution
    ==========
    
    Upgrade to 9.16.3-1.
    
    # pacman -Syu "bind>=9.16.3-1"
    
    The problems have been fixed upstream in version 9.16.3.
    
    Workaround
    ==========
    
    None.
    
    Description
    ===========
    
    - CVE-2020-8616 (denial of service)
    
    An issue has been found in bind before 9.16.3, which does not
    sufficiently limit the number of fetches which may be performed while
    processing a referral response. A malicious actor who intentionally
    exploits this lack of effective limitation on the number of fetches
    performed when processing referrals can, through the use of specially
    crafted referrals, cause a recursing server to issue a very large
    number of fetches in an attempt to process the referral. This has at
    least two potential effects: the performance of the recursing server
    can potentially be degraded by the additional work required to perform
    these fetches, and the attacker can exploit this behavior to use the
    recursing server as a reflector in a reflection attack with a high
    amplification factor.
    
    - CVE-2020-8617 (denial of service)
    
    An error in bind before 9.16.3 in the code which checks the validity of
    messages containing TSIG resource records can be exploited by an
    attacker to trigger an assertion failure in tsig.c, resulting in denial
    of service to clients.
    
    Impact
    ======
    
    A remote attacker can use the recursor has an amplification vector to
    cause a denial of service via a crafted reply. In addition, a remote
    attacker can crash the application by guessing the TSIG key name.
    
    References
    ==========
    
    https://kb.isc.org/docs/cve-2020-8616
    https://kb.isc.org/docs/cve-2020-8617
    https://kb.isc.org/docs/cve-2020-8617-faq-and-supplemental-information
    https://www.nxnsattack.com/
    https://security.archlinux.org/CVE-2020-8616
    https://security.archlinux.org/CVE-2020-8617
    

    LinuxSecurity Poll

    Are you considering making the switch to Purism's new Librem 14 Linux laptop to improve your security and privacy online?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/31-are-you-considering-making-the-switch-to-purism-s-new-librem-14-linux-laptop-to-improve-your-security-and-privacy-online?task=poll.vote&format=json
    31
    radio
    [{"id":"109","title":"Yes - the hardware kill switches and default ad blocking\/tracking protection sold me on it.","votes":"3","type":"x","order":"1","pct":37.5,"resources":[]},{"id":"110","title":"Not sure yet - I need to do more research.","votes":"4","type":"x","order":"2","pct":50,"resources":[]},{"id":"111","title":"No - I'm satisfied with my current laptop and have no security\/privacy concerns.","votes":"1","type":"x","order":"3","pct":12.5,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Advisories

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.