CVE Vulnerabilities

CVE-2020-8624

Improper Privilege Management

Published: Aug 21, 2020 | Modified: Nov 21, 2024
CVSS 3.x
4.3
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
CVSS 2.x
4 MEDIUM
AV:N/AC:L/Au:S/C:N/I:P/A:N
RedHat/V2
RedHat/V3
4.3 MODERATE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

In BIND 9.9.12 -> 9.9.13, 9.10.7 -> 9.10.8, 9.11.3 -> 9.11.21, 9.12.1 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.12-S1 -> 9.9.13-S1, 9.11.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker who has been granted privileges to change a specific subset of the zones content could abuse these unintended additional privileges to update other contents of the zone.

Weakness

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.

Affected Software

NameVendorStart VersionEnd Version
BindIsc9.9.12 (including)9.9.13 (including)
BindIsc9.10.7 (including)9.10.8 (including)
BindIsc9.11.3 (including)9.11.21 (including)
BindIsc9.12.1 (including)9.16.5 (including)
BindIsc9.17.0 (including)9.17.3 (including)
Red Hat Enterprise Linux 7RedHatbind-32:9.11.4-26.P2.el7_9.2*
Red Hat Enterprise Linux 7.7 Extended Update SupportRedHatbind-32:9.11.4-9.P2.el7_7.3*
Red Hat Enterprise Linux 8RedHatbind-32:9.11.20-5.el8*
Red Hat Enterprise Linux 8RedHatbind-32:9.11.20-5.el8*
Bind9Ubuntubionic*
Bind9Ubuntudevel*
Bind9Ubuntuesm-infra/bionic*
Bind9Ubuntuesm-infra/focal*
Bind9Ubuntufocal*
Bind9Ubuntutrusty*

Potential Mitigations

References