Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
None
Privileges Required
High
Attack Vector
Network
0

CVE-2020-8619

Disclosure Date: June 10, 2020
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

In ISC BIND9 versions BIND 9.11.14 –> 9.11.19, BIND 9.14.9 –> 9.14.12, BIND 9.16.0 –> 9.16.3, BIND Supported Preview Edition 9.11.14-S1 –> 9.11.19-S1: Unless a nameserver is providing authoritative service for one or more zones and at least one zone contains an empty non-terminal entry containing an asterisk (“*”) character, this defect cannot be encountered. A would-be attacker who is allowed to change zone content could theoretically introduce such a record in order to exploit this condition to cause denial of service, though we consider the use of this vector unlikely because any such attack would require a significant privilege level and be easily traceable.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
4.9 Medium
Impact Score:
3.6
Exploitability Score:
1.2
Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
High
User Interaction (UI):
None
Scope (S):
Unchanged
Confidentiality (C):
None
Integrity (I):
None
Availability (A):
High

General Information

Vendors

  • canonical,
  • debian,
  • fedoraproject,
  • isc,
  • netapp,
  • opensuse

Products

  • bind,
  • debian linux 10.0,
  • fedora 31,
  • fedora 32,
  • leap 15.1,
  • leap 15.2,
  • steelstore cloud integrated storage -,
  • ubuntu linux 20.04
Technical Analysis