In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker on the network path for a TSIG-signed request, or operating the server receiving the TSIG-signed request, could send a truncated response to that request, triggering an assertion failure, causing the server to exit. Alternately, an off-path attacker would have to correctly guess when a TSIG-signed request was sent, along with other characteristics of the packet and message, and spoof a truncated response to trigger an assertion failure, causing the server to exit.
{
"versions": [
{
"introduced": "9.0.0"
},
{
"last_affected": "9.11.21"
},
{
"introduced": "9.12.0"
},
{
"last_affected": "9.16.5"
},
{
"introduced": "9.17.0"
},
{
"last_affected": "9.17.3"
},
{
"introduced": "0"
},
{
"last_affected": "9.9.3-s1"
},
{
"introduced": "0"
},
{
"last_affected": "9.0"
}
]
}[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.11.21-s1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "31"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "32"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "12.04"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "14.04"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "16.04"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "18.04"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "20.04"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "15.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "15.2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.2.2-5028"
}
]
},
{
"events": [
{
"introduced": "8.0.0"
},
{
"last_affected": "8.5.0"
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-8622.json"