Skip to main content

ISC Releases Security Advisories for BIND

Report a cyber attack: call 0300 303 5222 or email [email protected]

Threat details

Introduction

The Internet Systems Consortium (ISC) has released security advisories that address vulnerabilities affecting multiple versions of ISC Berkeley Internet Name Domain (BIND). A remote attacker could exploit these vulnerabilities to cause a denial-of-service condition.


Remediation advice

Users and administrators are encouraged to review the following ISC advisories for further information and to apply the relevant updates.


Remediation steps

Type Step
Patch

ISC security advisory CVE-2020-8620: A specially crafted large TCP payload can trigger an assertion failure in tcpdns.c


https://kb.isc.org/docs/cve-2020-8620
Patch

ISC security advisory CVE-2020-8621: Attempting QNAME minimization after forwarding can lead to an assertion failure in resolver.c


https://kb.isc.org/docs/cve-2020-8621
Patch

ISC security advisory CVE-2020-8622: A truncated TSIG response can lead to an assertion failure


https://kb.isc.org/docs/cve-2020-8622
Patch

ISC security advisory CVE-2020-8623: A flaw in native PKCS#11 code can lead to a remotely triggerable assertion failure in pk11.c


https://kb.isc.org/docs/cve-2020-8623
Patch

ISC security advisory CVE-2020-8624: update-policy rules of type "subdomain" are enforced incorrectly


https://kb.isc.org/docs/cve-2020-8624

CVE Vulnerabilities

Last edited: 24 August 2020 1:47 pm