IBM Support

Security Bulletin: BIND for IBM i is affected by CVE-2020-8622 and CVE-2020-8624

Security Bulletin


BIND is used by IBM i. IBM i has addressed the applicable CVEs.

Vulnerability Details

CVEID:   CVE-2020-8624
DESCRIPTION:   ISC BIND could allow a remote authenticated attacker to bypass security restrictions, caused by the failure to properly enforce the update-policy rules of type "subdomain". By sending a specially-crafted request, an attacker could exploit this vulnerability to update other contents of the zone.
CVSS Base score: 4.3
CVSS Temporal Score: See: for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)

CVEID:   CVE-2020-8622
DESCRIPTION:   ISC BIND is vulnerable to a denial of service, caused by an assertion failure when attempting to verify a truncated response to a TSIG-signed request. By sending a specially-crafted request, a remote authenticated attacker could exploit this vulnerability to cause the server to exit.
CVSS Base score: 6.5
CVSS Temporal Score: See: for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)

Affected Products and Versions


Affected Product(s)Version(s)
IBM i7.4
IBM i7.3
IBM i7.2
IBM i7.1



The issues can be fixed by applying a PTF to IBM i.  Releases 7.4 7.3, 7.2 and 7.1 of IBM i are supported and will be fixed. 

The IBM i PTF numbers are:
Release 7.4 – SI74159
Release 7.3 – SI74160
Release 7.2 – SI74161
Release 7.1 – SI74204

Important note: IBM recommends that all users running unsupported versions of affected products upgrade to supported and fixed version of affected products.

Workarounds and Mitigations


Get Notified about Future Security Bulletins



Change History

17 Oct 2020: Initial Publication

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.


Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

Document Location


[{"Type":"MASTER","Line of Business":{"code":"LOB57","label":"Power"},"Business Unit":{"code":"BU058","label":"IBM Infrastructure w\/TPS"},"Product":{"code":"SWG60","label":"IBM i"},"Platform":[{"code":"PF012","label":"IBM i"}],"Version":"7.1.0"}]

Document Information

Modified date:
20 October 2020