CVE-2020-8624
Published: 20 August 2020
In BIND 9.9.12 -> 9.9.13, 9.10.7 -> 9.10.8, 9.11.3 -> 9.11.21, 9.12.1 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.12-S1 -> 9.9.13-S1, 9.11.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker who has been granted privileges to change a specific subset of the zone's content could abuse these unintended additional privileges to update other contents of the zone.
Priority
CVSS 3 base score: 4.3
Status
Package | Release | Status |
---|---|---|
bind9 Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 20.10 (Groovy Gorilla) |
Released
(1:9.16.6-2ubuntu1)
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Released
(1:9.16.1-0ubuntu2.3)
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Released
(1:9.11.3+dfsg-1ubuntu1.13)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Not vulnerable
(code not present)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Not vulnerable
(code not present)
|
Notes
Author | Note |
---|---|
amurray | Affects versions 9.9.12 -> 9.9.13, 9.10.7 -> 9.10.8, 9.11.3 -> 9.11.21, 9.12.1 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.12-S1 -> 9.9.13-S1, 9.11.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition |