SUSE update for bind



Published: 2021-08-30
Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2020-8622
CWE-ID CWE-617
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
SUSE OpenStack Cloud Crowbar
Operating systems & Components / Operating system

SUSE Linux Enterprise Server for SAP
Operating systems & Components / Operating system

HPE Helion Openstack
Operating systems & Components / Operating system

SUSE Linux Enterprise Server
Operating systems & Components / Operating system

SUSE OpenStack Cloud
Operating systems & Components / Operating system

bind-utils-debuginfo
Operating systems & Components / Operating system package or component

bind-utils
Operating systems & Components / Operating system package or component

bind-libs-debuginfo
Operating systems & Components / Operating system package or component

bind-libs-debuginfo-32bit
Operating systems & Components / Operating system package or component

bind-libs
Operating systems & Components / Operating system package or component

bind-libs-32bit
Operating systems & Components / Operating system package or component

bind-debugsource
Operating systems & Components / Operating system package or component

bind-debuginfo
Operating systems & Components / Operating system package or component

bind-chrootenv
Operating systems & Components / Operating system package or component

bind
Operating systems & Components / Operating system package or component

bind-doc
Operating systems & Components / Operating system package or component

Vendor SUSE

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Reachable Assertion

EUVDB-ID: #VU45819

Risk: Medium

CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-8622

CWE-ID: CWE-617 - Reachable Assertion

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a reachable assertion when handling TSIG-signed request. An attacker on the network path for a TSIG-signed request, or operating the server receiving the TSIG-signed request, could send a truncated response to that request, triggering an assertion failure, causing the server to exit.

Mitigation

Update the affected package bind to the latest version.

Vulnerable software versions

SUSE OpenStack Cloud Crowbar: 8

SUSE Linux Enterprise Server for SAP: 12-SP3

HPE Helion Openstack: 8

SUSE Linux Enterprise Server: 12-SP2-BCL - 12-SP3-LTSS

SUSE OpenStack Cloud: 8

bind-utils-debuginfo: before 9.9.9P1-63.28.1

bind-utils: before 9.9.9P1-63.28.1

bind-libs-debuginfo: before 9.9.9P1-63.28.1

bind-libs-debuginfo-32bit: before 9.9.9P1-63.28.1

bind-libs: before 9.9.9P1-63.28.1

bind-libs-32bit: before 9.9.9P1-63.28.1

bind-debugsource: before 9.9.9P1-63.28.1

bind-debuginfo: before 9.9.9P1-63.28.1

bind-chrootenv: before 9.9.9P1-63.28.1

bind: before 9.9.9P1-63.28.1

bind-doc: before 9.9.9P1-63.28.1

External links

http://www.suse.com/support/update/announcement/2021/suse-su-20212876-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###