
====================================================================

                             CERT-Renater

                 Note d'Information No. 2020/VULN465
_____________________________________________________________________

DATE                : 21/08/2020

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running BIND versions prior to 9.11.22,
                                9.16.6, 9.17.4.

=====================================================================
https://lists.isc.org/pipermail/bind-announce/2020-August/001162.html
https://lists.isc.org/pipermail/bind-announce/2020-August/001163.html
https://lists.isc.org/pipermail/bind-announce/2020-August/001164.html
https://lists.isc.org/pipermail/bind-announce/2020-August/001165.html
https://lists.isc.org/pipermail/bind-announce/2020-August/001166.html
https://lists.isc.org/pipermail/bind-announce/2020-August/001167.html
_____________________________________________________________________

Our August maintenance releases of BIND are available and can be
downloaded from the ISC software download page, https://www.isc.org/download

In addition to bug fixes and feature improvements, these particular
maintenance releases also contain fixes for five vulnerabilities,
CVE-2020-8620, CVE-2020-8621, CVE-2020-8622, CVE-2020-8623, and
CVE-2020-8624, about which more information
is provided in these Security Advisories:

  https://kb.isc.org/docs/cve-2020-8620
  https://kb.isc.org/docs/cve-2020-8621
  https://kb.isc.org/docs/cve-2020-8622
  https://kb.isc.org/docs/cve-2020-8623
  https://kb.isc.org/docs/cve-2020-8624

A summary of significant changes in the new releases can be found in
their release notes:

current supported stable branches:

  9.11.22 -
https://downloads.isc.org/isc/bind9/9.11.22/RELEASE-NOTES-bind-9.11.22.html
  9.16.6  -
https://downloads.isc.org/isc/bind9/9.16.6/doc/arm/html/notes.html

experimental development branch:

  9.17.4  -
https://downloads.isc.org/isc/bind9/9.17.4/doc/arm/html/notes.html

_____________________________________________________________________

CVE:                 CVE-2020-8620
Document version:    2.0
Posting date:        20 August 2020
Program impacted:    BIND
Versions affected:   BIND 9.15.6 -> 9.16.5, 9.17.0 -> 9.17.3
Severity:            Medium
Exploitable:         Remotely

Description:

   In versions of BIND that use the libuv network manager (9.16.x is the
   only stable branch affected) an incorrectly specified maximum buffer
   size allows a specially crafted large TCP payload to trigger an
   assertion failure when it is received.

Impact:

   An attacker who can establish a TCP connection with the server and
   send data on that connection can exploit this to trigger the
   assertion failure, causing the server to exit.

CVSS Score: 6.7
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C

For more information on the Common Vulnerability Scoring System and to
obtain your specific environmental score please visit:
https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C&version=3.1.

Workarounds:

   No workarounds known.

Active exploits:

   We are not aware of any active exploits.

Solution:

   Upgrade to the patched release most closely related to your current
   version of BIND:

   - BIND 9.16.6
   - BIND 9.17.4

Acknowledgments:

   ISC would like to thank Emanuel Almeida of Cisco Systems, Inc. for
   bringing
   this vulnerability to our attention.

Document revision history:

   1.0 Early Notification, 12 August 2020
   1.1 Updated Posting Date, 17 August 2020
   2.0 Public Announcement, 20 August 2020

Related documents:

   See our BIND 9 Security Vulnerability Matrix for a complete listing
   of security vulnerabilities and versions affected.

Do you still have questions? Questions regarding this advisory should go
to security-officer at isc.org.  To report a new issue, please encrypt
your message using security-officer at isc.org's PGP key which can be
found here:
https://www.isc.org/pgpkey/

If you are unable to use encrypted email, you may also report new issues
at:
https://www.isc.org/reportbug/

Note:

   ISC patches only currently supported versions. When possible we
   indicate EOL versions affected.  (For current information on which
   versions are actively supported, please see
   https://www.isc.org/download/.)

ISC Security Vulnerability Disclosure Policy:

   Details of our current security advisory policy and practice can be
   found in the ISC Software Defect and Security Vulnerability
   Disclosure Policy at
   https://kb.isc.org/docs/aa-00861

The Knowledgebase article https://kb.isc.org/docs/cve-2020-8620 is the
complete and official security advisory document.

Legal Disclaimer:

   Internet Systems Consortium (ISC) is providing this notice on an "AS
   IS" basis. No warranty or guarantee of any kind is expressed in this
   notice and none should be implied. ISC expressly excludes and
   disclaims any warranties regarding this notice or materials referred
   to in this notice, including, without limitation, any implied
   warranty of merchantability, fitness for a particular purpose,
   absence of hidden defects, or of non-infringement. Your
   use or reliance on this notice or materials referred to in this
   notice is at your own risk. ISC may change this notice at any time. A
   stand-alone copy or paraphrase of the text of this document that
   omits the document URL is an uncontrolled copy. Uncontrolled copies
   may lack important information, be out of date, or contain factual
   errors.

_____________________________________________________________________

CVE:                 CVE-2020-8621
Document version:    2.0
Posting date:        20 August 2020
Program impacted:    BIND
Versions affected:   BIND 9.14.0 -> 9.16.5, 9.17.0 -> 9.17.3
Severity:            Medium
Exploitable:         Remotely

Description:

   While query forwarding and QNAME minimization are mutually
   incompatible, BIND did sometimes allow QNAME minimization when
   continuing with recursion after 'forward first' did not result in an
   answer.  In these cases the data used by QNAME minimization might be
   inconsistent, leading to an assertion failure, causing the server to
   exit.

Impact:

   If a server is configured with both QNAME minimization and 'forward
   first' then an attacker who can send queries to it may be able to
   trigger the condition that will cause the server to crash.

   Servers that 'forward only' are not affected.

CVSS Score: 6.7
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C

For more information on the Common Vulnerability Scoring System and to
obtain your specific environmental score please visit:
https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C&version=3.1.

Workarounds:

   No workarounds known.

Active exploits:

   We are not aware of any active exploits.

Solution:

   Upgrade to the patched release most closely related to your current
   version of BIND:

   - BIND 9.16.6
   - BIND 9.17.4

Acknowledgments:

   ISC would like to thank Joseph Gullo for bringing this vulnerability
   to our attention.

Document revision history:

   1.0 Early Notification, 12 August 2020
   1.1 Updated Posting Date, 17 August 2020
   2.0 Public Announcement, 20 August 2020

Related documents:

   See our BIND 9 Security Vulnerability Matrix for a complete listing
   of security vulnerabilities and versions affected.

Do you still have questions? Questions regarding this advisory should go
to security-officer at isc.org.  To report a new issue, please encrypt
your message using security-officer at isc.org's PGP key which can be
found here: https://www.isc.org/pgpkey/

If you are unable to use encrypted email, you may also report new issues at:
https://www.isc.org/reportbug/

Note:

   ISC patches only currently supported versions. When possible we
   indicate EOL versions affected.  (For current information on which
   versions are actively supported, please see
   https://www.isc.org/download/.)

ISC Security Vulnerability Disclosure Policy:

   Details of our current security advisory policy and practice can be
   found in the ISC Software Defect and Security Vulnerability
   Disclosure Policy at https://kb.isc.org/docs/aa-00861

The Knowledgebase article https://kb.isc.org/docs/cve-2020-8621 is the
complete and official security advisory document.

Legal Disclaimer:

   Internet Systems Consortium (ISC) is providing this notice on an "AS
   IS" basis. No warranty or guarantee of any kind is expressed in this
   notice and none should be implied. ISC expressly excludes and
   disclaims any warranties regarding this notice or materials referred
   to in this notice, including, without limitation, any implied
   warranty of merchantability, fitness for a particular purpose,
   absence of hidden defects, or of non-infringement. Your use or
   reliance on this notice or materials referred to in this notice is at
   your own risk. ISC may change this notice at any time. A stand-alone
   copy or paraphrase of the text of this document that omits the
   document URL is an uncontrolled copy. Uncontrolled copies may lack
   important information, be out of date, or contain factual errors.
_____________________________________________________________________

CVE:                 CVE-2020-8622
Document version:    2.0
Posting date:        20 August 2020
Program impacted:    BIND
Versions affected:   BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 ->
9.17.3,
                     also affects 9.9.3-S1 -> 9.11.21-S1 of the BIND
Supported
                     Preview Edition
Severity:            Medium
Exploitable:         Remotely

Description:

   Attempting to verify a truncated response to a TSIG-signed request
   leads to an assertion failure.

Impact:

   An attacker on the network path for a TSIG-signed request, or
   operating the server receiving the TSIG-signed request, could send a
   truncated response to that request, triggering an assertion failure,
   causing the server to exit.

   Alternately, an off-path attacker would have to correctly guess when
   a TSIG-signed request was sent, along with other characteristics of
   the packet and message, and spoof a truncated response to trigger an
   assertion failure, causing the server to exit.

CVSS Score: 5.9
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C

For more information on the Common Vulnerability Scoring System and to
obtain your specific environmental score please visit:
https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C&version=3.1.

Workarounds:

   No workarounds known.

Active exploits:

   We are not aware of any active exploits.

Solution:

   Upgrade to the patched release most closely related to your current
   version of BIND:

   - BIND 9.11.22
   - BIND 9.16.6
   - BIND 9.17.4

   BIND Supported Preview Edition is a special feature preview branch of
   BIND provided to eligible ISC support customers.

   - BIND 9.11.22-S1

Acknowledgments:

   ISC would like to thank Dave Feldman, Jeff Warren, and Joel
   Cunningham  of
   Oracle for bringing this vulnerability to our attention.

Document revision history:

   1.0 Early Notification, 12 August 2020
   1.1 Updated Posting Date, 17 August 2020
   2.0 Public Announcement, 20 August 2020

Related documents:

   See our BIND 9 Security Vulnerability Matrix for a complete listing
   of security vulnerabilities and versions affected.

Do you still have questions? Questions regarding this advisory should go
to security-officer at isc.org.  To report a new issue, please encrypt
your message using security-officer at isc.org's PGP key which can be
found here:
https://www.isc.org/pgpkey/

If you are unable to use encrypted email, you may also report new issues
at:
https://www.isc.org/reportbug/

Note:

   ISC patches only currently supported versions. When possible we
   indicate EOL versions affected.  (For current information on which
   versions are actively supported, please see
   https://www.isc.org/download/.)

ISC Security Vulnerability Disclosure Policy:

   Details of our current security advisory policy and practice can be
   found in the ISC Software Defect and Security Vulnerability
   Disclosure Policy at https://kb.isc.org/docs/aa-00861

The Knowledgebase article https://kb.isc.org/docs/cve-2020-8622 is the
complete and official security advisory document.

Legal Disclaimer:

   Internet Systems Consortium (ISC) is providing this notice on an "AS
   IS" basis. No warranty or guarantee of any kind is expressed in this
   notice and none should be implied. ISC expressly excludes and
   disclaims any warranties regarding this notice or materials referred
   to in this notice, including, without limitation, any implied
   warranty of merchantability, fitness for a particular purpose,
   absence of hidden defects, or of non-infringement. Your use or
   reliance on this notice or materials referred to in this notice is at
   your own risk. ISC may change this notice at any time. A stand-alone
   copy or paraphrase of the text of this document that omits the
   document URL is an uncontrolled copy. Uncontrolled copies may lack
   important information, be out of date, or contain factual errors.


_____________________________________________________________________

CVE:                 CVE-2020-8623
Document version:    2.0
Posting date:        20 August 2020
Program impacted:    BIND
Versions affected:   BIND 9.10.0 -> 9.11.21, 9.12.0 -> 9.16.5,
                     9.17.0 -> 9.17.3, also affects 9.10.5-S1 -> 9.11.21-S1
                     of the BIND 9 Supported Preview Edition
Severity:            Medium
Exploitable:         Remotely

Description:

   If BIND is built with "--enable-native-pkcs11" then a specially
   crafted query for a zone signed with RSA can trigger an assertion
   failure.

Impact:

   An attacker that can reach a vulnerable system with a specially
   crafted query packet can trigger a crash.

   To be vulnerable, the system must:

   -  be running BIND that was built with "--enable-native-pkcs11"

   -  be signing one or more zones with an RSA key

   -  be able to receive queries from a possible attacker

CVSS Score: 6.7
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C

For more information on the Common Vulnerability Scoring System and to
obtain your specific environmental score please visit:
https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C&version=3.1.

Workarounds:

   No workarounds known.

Active exploits:

   We are not aware of any active exploits.

Solution:

   Upgrade to the patched release most closely related to your current
   version of BIND:

   - BIND 9.11.22
   - BIND 9.16.6
   - BIND 9.17.4

   BIND Supported Preview Edition is a special feature preview branch of
   BIND provided to eligible ISC support customers.

   - BIND 9.11.22-S1

Acknowledgments:

   ISC would like to thank Lyu Chiy for bringing this vulnerability to our
   attention.

Document revision history:

   1.0 Early Notification, 12 August 2020
   1.1 Updated Posting Date, 17 August 2020
   2.0 Public Announcement, 20 August 2020

Related documents:

   See our BIND 9 Security Vulnerability Matrix for a complete listing
   of security vulnerabilities and versions affected.

Do you still have questions? Questions regarding this advisory should go
to security-officer at isc.org.  To report a new issue, please encrypt
your message using security-officer at isc.org's PGP key which can be
found here:
https://www.isc.org/pgpkey/

If you are unable to use encrypted email, you may also report new issues
at:
https://www.isc.org/reportbug/

Note:

   ISC patches only currently supported versions. When possible we
   indicate EOL versions affected.  (For current information on which
   versions are actively supported, please see
https://www.isc.org/download/.)

ISC Security Vulnerability Disclosure Policy:

   Details of our current security advisory policy and practice can be
   found in the ISC Software Defect and Security Vulnerability
   Disclosure Policy at
   https://kb.isc.org/docs/aa-00861

The Knowledgebase article https://kb.isc.org/docs/cve-2020-8623 is the
complete and official security advisory document.

Legal Disclaimer:

   Internet Systems Consortium (ISC) is providing this notice on an "AS
   IS" basis. No warranty or guarantee of any kind is expressed in this
   notice and none should be implied. ISC expressly excludes and
   disclaims any warranties regarding this notice or materials referred
   to in this notice, including, without limitation, any implied
   warranty of merchantability, fitness for a particular purpose,
   absence of hidden defects, or of non-infringement. Your use or
   reliance on this notice or materials referred to in this notice is at
   your own risk. ISC may change this notice at any time. A stand-alone
   copy or paraphrase of the text of this document that omits the
   document URL is an uncontrolled copy. Uncontrolled copies may lack
   important information, be out of date, or contain factual errors.

_____________________________________________________________________

CVE:                 CVE-2020-8624
Document version:    2.0
Posting date:        20 August 2020
Program impacted:    BIND
Versions affected:   BIND 9.9.12 -> 9.9.13, 9.10.7 -> 9.10.8,
                     9.11.3 -> 9.11.21, 9.12.1 -> 9.16.5, 9.17.0 -> 9.17.3,
                     also affects 9.9.12-S1 -> 9.9.13-S1,
                     9.11.3-S1 -> 9.11.21-S1 of the BIND 9 Supported
                     Preview Edition
Severity:            Low
Exploitable:         Remotely

Description:

   Change 4885 inadvertently caused "update-policy" rules of type
"subdomain" to be treated as if they were of type "zonesub", allowing
updates to all parts of the zone along with the intended subdomain.

Impact:

   An attacker who has been granted privileges to change a specific
   subset of the zone's content could abuse these unintended additional
   privileges to update other contents of the zone.

CVSS Score: 3.9
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C

For more information on the Common Vulnerability Scoring System and to
obtain your specific environmental score please visit:
https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C&version=3.1.

Workarounds:

   No workarounds known.

Active exploits:

   We are not aware of any active exploits but the issue has been
   described on a public bug tracker for a Linux distribution.

Solution:

   Upgrade to the patched release most closely related to your current
   version of BIND:

   - BIND 9.11.22
   - BIND 9.16.6
   - BIND 9.17.4

   BIND Supported Preview Edition is a special feature preview branch of
   BIND provided to eligible ISC support customers.

   - BIND 9.11.22-S1

Acknowledgments:

   ISC would like to thank Joop Boonen of credativ GmbH for bringing this
   vulnerability to our attention.

Document revision history:

1.0 Early Notification, 12 August 2020
1.1 Updated Posting Date, 17 August 2020
2.0 Public Announcement, 20 August 2020

Related documents:

   See our BIND 9 Security Vulnerability Matrix for a complete listing
   of security vulnerabilities and versions affected.

Do you still have questions? Questions regarding this advisory should go
to security-officer at isc.org.  To report a new issue, please encrypt
your message using security-officer at isc.org's PGP key which can be
found here:
https://www.isc.org/pgpkey/

If you are unable to use encrypted email, you may also report new issues at:
https://www.isc.org/reportbug/

Note:

   ISC patches only currently supported versions. When possible we
   indicate EOL versions affected.  (For current information on which
   versions are actively supported, please see
   https://www.isc.org/download/.)

ISC Security Vulnerability Disclosure Policy:

   Details of our current security advisory policy and practice can be
   found in the ISC Software Defect and Security Vulnerability
   Disclosure Policy at
   https://kb.isc.org/docs/aa-00861

The Knowledgebase article https://kb.isc.org/docs/cve-2020-8624 is the
complete and official security advisory document.

Legal Disclaimer:

   Internet Systems Consortium (ISC) is providing this notice on an "AS
   IS" basis. No warranty or guarantee of any kind is expressed in this
   notice and none should be implied. ISC expressly excludes and
   disclaims any warranties regarding this notice or materials referred
   to in this notice, including, without limitation, any implied
   warranty of merchantability, fitness for a particular purpose,
   absence of hidden defects, or of non-infringement. Your use or
   reliance on this notice or materials referred to in this notice is at
   your own risk. ISC may change this notice at any time. A stand-alone
   copy or paraphrase of the text of this document that omits the
   document URL is an uncontrolled copy. Uncontrolled copies may lack
   important information, be out of date, or contain factual errors.


=========================================================
+ CERT-RENATER       |    tel : 01-53-94-20-44          +
+ 23/25 Rue Daviel   |    fax : 01-53-94-20-41          +
+ 75013 Paris        |    email:cert@support.renater.fr +
=========================================================




