Lucene search

K
f5F5F5:K17181
HistorySep 03, 2015 - 12:00 a.m.

K17181 : BIND vulnerability CVE-2015-5722

2015-09-0300:00:00
my.f5.com
36

AI Score

8.3

Confidence

High

EPSS

0.966

Percentile

99.6%

Security Advisory Description

Parsing a malformed DNSSEC key can cause a validating resolver to exit due to a failed assertion in buffer.c. It is possible for a remote attacker to deliberately trigger this condition, for example by using a query which requires a response from a zone containing a deliberately malformed key. (CVE-2015-5722)
Impact
A remote attacker may be able to cause a denial-of-service (DoS) attack on the BIG-IP system’s local instance of BIND by using a specially crafted DNS request in configurations that expose BIND to requests from untrusted users. If the BIND process (named) terminates or stops responding, the**bigstart **process will automatically restart the impacted daemon.Note: Recursive servers are at greatest risk from this defect, but some circumstances may exist in which the attack can be successfully exploited against an authoritative server.