Synology DNS Server 2.2.2-5027

CPE Details

Synology DNS Server 2.2.2-5027
2.2.2-5027
2022-04-01
11h08 +00:00
2022-10-04
15h18 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:synology:dns_server:2.2.2-5027:*:*:*:*:*:*:*

Informations

Vendor

synology

Product

dns_server

Version

2.2.2-5027

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2020-8622 2020-08-21 20h50 +00:00 In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker on the network path for a TSIG-signed request, or operating the server receiving the TSIG-signed request, could send a truncated response to that request, triggering an assertion failure, causing the server to exit. Alternately, an off-path attacker would have to correctly guess when a TSIG-signed request was sent, along with other characteristics of the packet and message, and spoof a truncated response to trigger an assertion failure, causing the server to exit.
6.5
Medium