Lucene search

K
f5F5F5:K17227
HistorySep 09, 2015 - 12:00 a.m.

K17227 : BIND vulnerability CVE-2015-5986

2015-09-0900:00:00
my.f5.com
19

AI Score

8.9

Confidence

High

EPSS

0.958

Percentile

99.5%

Security Advisory Description

An incorrect boundary check in openpgpkey_61.c can cause named to terminate due to a REQUIRE assertion failure. This defect can be deliberately exploited by an attacker who can provide a maliciously constructed response in answer to a query.
(
CVE-2015-5986
)
Impact
A remote attacker may be able to cause a denial-of-service (DoS) attack on the BIG-IP system’s local instance of BIND by using a specially crafted DNS request in configurations that expose BIND to requests from untrusted users. If the BIND process (named) terminates or stops responding, the**bigstart **process will automatically restart the impacted daemon.