Learn about CVE-2020-8623 affecting BIND versions 9.10.0 to 9.11.21, 9.12.0 to 9.16.5, and 9.17.0 to 9.17.3. Upgrade to secure versions and follow mitigation steps.
In BIND 9.10.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.10.5-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, an attacker can trigger a crash by sending a specially crafted query packet to a vulnerable system.
Understanding CVE-2020-8623
This CVE involves a flaw in native PKCS#11 code that can lead to a remotely triggerable assertion failure in pk11.c.
What is CVE-2020-8623?
This vulnerability affects BIND versions 9.10.0 to 9.11.21, 9.12.0 to 9.16.5, and 9.17.0 to 9.17.3, including specific versions of the BIND 9 Supported Preview Edition. An attacker exploiting this flaw can crash the system by sending a specially crafted query packet.
The Impact of CVE-2020-8623
Technical Details of CVE-2020-8623
This section provides more in-depth technical information about the vulnerability.
Vulnerability Description
If BIND is built with "--enable-native-pkcs11," a specially crafted query for a zone signed with RSA can trigger an assertion failure.
Affected Systems and Versions
Exploitation Mechanism
An attacker must send a specially crafted query packet to a vulnerable system running BIND built with "--enable-native-pkcs11" and signing zones with an RSA key.
Mitigation and Prevention
To address CVE-2020-8623, follow these mitigation strategies:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates