{"id":"CVE-2020-8624","details":"In BIND 9.9.12 -\u003e 9.9.13, 9.10.7 -\u003e 9.10.8, 9.11.3 -\u003e 9.11.21, 9.12.1 -\u003e 9.16.5, 9.17.0 -\u003e 9.17.3, also affects 9.9.12-S1 -\u003e 9.9.13-S1, 9.11.3-S1 -\u003e 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker who has been granted privileges to change a specific subset of the zone's content could abuse these unintended additional privileges to update other contents of the zone.","modified":"2026-05-15T12:04:08.563285018Z","published":"2020-08-21T21:15:12.480Z","related":["CGA-gg4p-4j9p-r7f6","SUSE-RU-2020:2915-1","SUSE-SU-2020:2914-1","openSUSE-SU-2020:1699-1","openSUSE-SU-2020:1701-1","openSUSE-SU-2024:10650-1"],"database_specific":{"unresolved_ranges":[{"source":"CPE_FIELD","vendor_product":"canonical:ubuntu_linux","extracted_events":[{"last_affected":"16.04"},{"last_affected":"18.04"},{"last_affected":"20.04"}],"cpes":["cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"]},{"source":"CPE_FIELD","vendor_product":"debian:debian_linux","extracted_events":[{"last_affected":"10.0"}],"cpes":["cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"]},{"source":"CPE_FIELD","vendor_product":"fedoraproject:fedora","extracted_events":[{"last_affected":"31"},{"last_affected":"32"}],"cpes":["cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"]},{"source":"CPE_FIELD","vendor_product":"isc:bind","extracted_events":[{"last_affected":"9.9.13-s1"},{"last_affected":"9.9.13-s1"},{"last_affected":"9.11.21-s1"},{"last_affected":"9.11.21-s1"}],"cpes":["cpe:2.3:a:isc:bind:9.11.21:s1:*:*:supported_preview:*:*:*","cpe:2.3:a:isc:bind:9.9.13:s1:*:*:supported_preview:*:*:*"]},{"source":"CPE_FIELD","vendor_product":"opensuse:leap","extracted_events":[{"last_affected":"15.1"},{"last_affected":"15.2"}],"cpes":["cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*"]}]},"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DQN62GBMCIC5AY4KYADGXNKVY6AJKSJE/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKAMJZXR66P6S5LEU4SN7USSNCWTXEXP/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html"},{"type":"ADVISORY","url":"https://kb.isc.org/docs/cve-2020-8624"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202008-19"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20200827-0003/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4468-1/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2020/dsa-4752"},{"type":"ADVISORY","url":"https://www.synology.com/security/advisory/Synology_SA_20_19"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"}]}