Vulnerability Details CVE-2020-8619
In ISC BIND9 versions BIND 9.11.14 -> 9.11.19, BIND 9.14.9 -> 9.14.12, BIND 9.16.0 -> 9.16.3, BIND Supported Preview Edition 9.11.14-S1 -> 9.11.19-S1: Unless a nameserver is providing authoritative service for one or more zones and at least one zone contains an empty non-terminal entry containing an asterisk ("*") character, this defect cannot be encountered. A would-be attacker who is allowed to change zone content could theoretically introduce such a record in order to exploit this condition to cause denial of service, though we consider the use of this vector unlikely because any such attack would require a significant privilege level and be easily traceable.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.05
EPSS Ranking 89.1%
CVSS Severity
CVSS v3 Score 4.9
CVSS v2 Score 4.0
Products affected by CVE-2020-8619
-
cpe:2.3:a:isc:bind:9.11.14
-
cpe:2.3:a:isc:bind:9.11.14-s1
-
cpe:2.3:a:isc:bind:9.11.18
-
cpe:2.3:a:isc:bind:9.11.19
-
cpe:2.3:a:isc:bind:9.11.19-s1
-
cpe:2.3:a:isc:bind:9.14.11
-
cpe:2.3:a:isc:bind:9.14.12
-
cpe:2.3:a:isc:bind:9.14.9
-
cpe:2.3:a:isc:bind:9.16.0
-
cpe:2.3:a:isc:bind:9.16.1
-
cpe:2.3:a:isc:bind:9.16.2
-
cpe:2.3:a:isc:bind:9.16.3
-
cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-
-
cpe:2.3:o:canonical:ubuntu_linux:20.04
-
cpe:2.3:o:debian:debian_linux:10.0
-
cpe:2.3:o:fedoraproject:fedora:31
-
cpe:2.3:o:fedoraproject:fedora:32
-
cpe:2.3:o:opensuse:leap:15.1
-
cpe:2.3:o:opensuse:leap:15.2