vendor:
BIND
by:
Anonymous
7,5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: BIND
Affected Version From: 9.9.9-P2
Affected Version To: 9.11.25-S1
Patch Exists: YES
Related CWE: CVE-2020-8616
CPE: a:isc:bind:9.9.9-p2
Metasploit:
https://www.rapid7.com/db/vulnerabilities/dns-bind-cve-2020-8616/, https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2020-8616/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2020-8616/, https://www.rapid7.com/db/vulnerabilities/ibm-aix-cve-2020-8616/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2020-8616/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp3-cve-2020-8616/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp2-cve-2020-8616/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp5-cve-2020-8616/, https://www.rapid7.com/db/vulnerabilities/f5-big-ip-cve-2020-8616/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2020-8616/, https://www.rapid7.com/db/vulnerabilities/juniper-junos-os-jsa11090/, https://www.rapid7.com/db/vulnerabilities/amazon_linux-cve-2020-8616/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2020-8616/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp8-cve-2020-8616/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2020-8616/, https://www.rapid7.com/db/vulnerabilities/amazon-linux-ami-2-cve-2020-8616/, https://www.rapid7.com/db/vulnerabilities/oracle-solaris-cve-2020-8616/
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux, Windows, Mac
2020
Bind Nuke Exploit
Bind Nuke is a buffer overflow exploit that targets the Domain Name System (DNS) server software, BIND. It is a type of attack that sends a maliciously crafted packet to a vulnerable DNS server, which then causes the server to crash or become unresponsive. The exploit works by sending a specially crafted packet to the DNS server, which contains a large amount of data that exceeds the maximum size of the packet. This causes the server to crash or become unresponsive, resulting in a denial of service (DoS) attack.
Mitigation:
The best way to mitigate this vulnerability is to upgrade to the latest version of BIND. Additionally, administrators should ensure that their DNS servers are configured securely and that they are running the latest version of BIND.