CVE Vulnerabilities

CVE-2020-8619

Improper Resource Shutdown or Release

Published: Jun 17, 2020 | Modified: Nov 21, 2024
CVSS 3.x
4.9
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
4 MEDIUM
AV:N/AC:L/Au:S/C:N/I:N/A:P
RedHat/V2
RedHat/V3
4.9 MODERATE
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

In ISC BIND9 versions BIND 9.11.14 -> 9.11.19, BIND 9.14.9 -> 9.14.12, BIND 9.16.0 -> 9.16.3, BIND Supported Preview Edition 9.11.14-S1 -> 9.11.19-S1: Unless a nameserver is providing authoritative service for one or more zones and at least one zone contains an empty non-terminal entry containing an asterisk (*) character, this defect cannot be encountered. A would-be attacker who is allowed to change zone content could theoretically introduce such a record in order to exploit this condition to cause denial of service, though we consider the use of this vector unlikely because any such attack would require a significant privilege level and be easily traceable.

Weakness

The product does not release or incorrectly releases a resource before it is made available for re-use.

Affected Software

NameVendorStart VersionEnd Version
BindIsc9.11.14 (including)9.11.19 (including)
BindIsc9.11.14-s1 (including)9.11.19-s1 (including)
BindIsc9.14.9 (including)9.14.12 (including)
BindIsc9.16.0 (including)9.16.3 (including)
Red Hat Enterprise Linux 8RedHatbind-32:9.11.20-5.el8*
Red Hat Enterprise Linux 8RedHatbind-32:9.11.20-5.el8*
Bind9Ubuntudevel*
Bind9Ubuntuesm-infra/focal*
Bind9Ubuntufocal*
Bind9Ubuntutrusty*
Bind9Ubuntuupstream*

Potential Mitigations

  • Use a language that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.
  • For example, languages such as Java, Ruby, and Lisp perform automatic garbage collection that releases memory for objects that have been deallocated.

References