Linux Security
    Linux Security
    Linux Security

    ArchLinux: 202006-13: bind: denial of service

    Date 30 Jun 2020
    Posted By LinuxSecurity Advisories
    The package bind before version 9.16.4-1 is vulnerable to denial of service.
    Arch Linux Security Advisory ASA-202006-13
    Severity: Medium
    Date    : 2020-06-28
    CVE-ID  : CVE-2020-8618 CVE-2020-8619
    Package : bind
    Type    : denial of service
    Remote  : Yes
    Link    :
    The package bind before version 9.16.4-1 is vulnerable to denial of
    Upgrade to 9.16.4-1.
    # pacman -Syu "bind>=9.16.4-1"
    The problems have been fixed upstream in version 9.16.4.
    - CVE-2020-8618 (denial of service)
    An assertion check in BIND before 9.16.4 (that is meant to prevent
    going beyond the end of a buffer when processing incoming data) can be
    incorrectly triggered by a large response during zone transfer. An
    attacker who is permitted to send zone data to a server via zone
    transfer can exploit this to intentionally trigger the assertion
    failure with a specially constructed zone, denying service to clients.
    - CVE-2020-8619 (denial of service)
    An issue has been found in Bind before 9.16.4, where an asterisk
    character in an empty non-terminal can cause an assertion failure in
    The asterisk character ("*") is allowed in DNS zone files, where it is
    most commonly present as a wildcard at a terminal node of the Domain
    Name System graph. However, the RFCs do not require and BIND does not
    enforce that an asterisk character be present only at a terminal node.
    A problem can occur when an asterisk is present in an empty non-
    terminal location within the DNS graph. If such a node exists, after a
    series of queries, named can reach an inconsistent state that results
    in the failure of an assertion check in rbtdb.c, followed by the
    program exiting due to the assertion failure.
    Unless a nameserver is providing authoritative service for one or more
    zones and at least one zone contains an empty non-terminal entry
    containing an asterisk ("*") character, this defect cannot be
    encountered. A would-be attacker who is allowed to change zone content
    could theoretically introduce such a record in order to exploit this
    condition to cause denial of service, though we consider the use of
    this vector unlikely because any such attack would require a
    significant privilege level and be easily traceable.
    A remote attacker with enough privileges to update a zone might be able
    to crash a server via a crafted zone transfer or by inserting an
    asterisk at a terminal node of a zone.

    LinuxSecurity Poll

    I agree with Linus Torvalds - Apple's new M1-powered laptops should run on Linux.

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    [{"id":"158","title":"True","votes":"11","type":"x","order":"1","pct":9.65,"resources":[]},{"id":"159","title":"False","votes":"103","type":"x","order":"2","pct":90.35,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.