Lucene search

K
f5F5F5:K74009656
HistoryApr 25, 2019 - 12:00 a.m.

K74009656 : BIND vulnerability CVE-2018-5743

2019-04-2500:00:00
my.f5.com
19

7.6 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

61.6%

Security Advisory Description

By design, BIND is intended to limit the number of TCP clients that can be connected at any given time. The number of allowed connections is a tunable parameter which, if unset, defaults to a conservative value for most servers. Unfortunately, the code which was intended to limit the number of simultaneous connections contained an error which could be exploited to grow the number of simultaneous connections beyond this limit. Versions affected: BIND 9.9.0 -> 9.10.8-P1, 9.11.0 -> 9.11.6, 9.12.0 -> 9.12.4, 9.14.0. BIND 9 Supported Preview Edition versions 9.9.3-S1 -> 9.11.5-S3, and 9.11.5-S5. Versions 9.13.0 -> 9.13.7 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2018-5743. (CVE-2018-5743)

Impact

BIG-IP / BIG-IQ / Enterprise Manager / F5 iWorkflow

An attacker may exhaust file descriptors available to the named process; as a result, network connections and the management of log files or zone journal files may be affected. In BIG-IQ / Enterprise Manager / F5 iWorkflow standard and default configurations, exposure is limited tolocalhost, and there is no remote exposure.

Traffix SDC

There is no impact; this F5 product is not affected by this vulnerability.