漏洞信息详情
ISC BIND 安全漏洞
漏洞简介
ISC BIND是美国ISC公司的一套实现了DNS协议的开源软件。
BIND 9.9.12 至9.9.13, 9.10.7至9.10.8, 9.11.3至9.11.21, 9.12.1至9.16.5, 9.17.0 至9.17.3, 9.9.12-S1至9.9.13-S1, 9.11.3-S1至9.11.21-S1存在安全漏洞,攻击者可以恶意使用新增权限更新其他区域内容。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://kb.isc.org/docs/cve-2020-8624
参考网址
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/DQN62GBMCIC5AY4KYADGXNKVY6AJKSJE/
来源:GENTOO
链接:https://security.gentoo.org/glsa/202008-19
来源:CONFIRM
链接:https://www.synology.com/security/advisory/Synology_SA_20_19
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/ZKAMJZXR66P6S5LEU4SN7USSNCWTXEXP/
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html
来源:CONFIRM
链接:https://kb.isc.org/docs/cve-2020-8624
来源:DEBIAN
链接:https://www.debian.org/security/2020/dsa-4752
来源:UBUNTU
链接:https://usn.ubuntu.com/4468-1/
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html
来源:CONFIRM
链接:https://security.netapp.com/advisory/ntap-20200827-0003/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158940/Ubuntu-Security-Notice-USN-4468-1.html
来源:www.nsfocus.net
链接:http://www.nsfocus.net/vulndb/49878
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159985/Red-Hat-Security-Advisory-2020-5011-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.0864
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3195.2/
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2020-8624
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159004/Gentoo-Linux-Security-Advisory-202008-19.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.4178/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3195.4/
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-bind-affects-ibm-integrated-analytics-system-5/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.0691
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3195/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2954/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/160205/Red-Hat-Security-Advisory-2020-5203-01.html
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-bind-for-ibm-i-is-affected-by-cve-2020-8622-and-cve-2020-8624/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3880/
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/ISC-BIND-privilege-escalation-via-Update-policy-Rules-33130
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-mq-appliance-is-affected-by-multiple-bind-vulnerabilities-cve-2020-8622-cve-2020-8623-cve-2020-8624/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3522/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3970/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159845/Red-Hat-Security-Advisory-2020-4500-01.html
受影响实体
暂无
补丁
- <!--2020-8-21-->
还没有评论,来说两句吧...