Ubuntu update for Bind



Published: 2019-11-21
Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2019-6477
CWE-ID CWE-399
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
bind9 (Ubuntu package)
Operating systems & Components / Operating system package or component

Vendor Canonical Ltd.

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Resource management error

EUVDB-ID: #VU22894

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-6477

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect implementation of TCP-pipelining feature in ISC BIND, aimed to limit the number of concurrent connections and protect the server from denial of service attacks. A remote attacker can initiate a TCP-pipelined connection with multiple queries that consume more resources than the server has been provisioned to handle and crash the server, when closing the connection.

Mitigation

Update the affected packages.

Ubuntu 19.10
bind9 - 1:9.11.5.P4+dfsg-5.1ubuntu2.1
Ubuntu 19.04
bind9 - 1:9.11.5.P1+dfsg-1ubuntu2.6
Ubuntu 18.04 LTS
bind9 - 1:9.11.3+dfsg-1ubuntu1.11

Vulnerable software versions

bind9 (Ubuntu package): 1:9.11.3+dfsg-1ubuntu1.1 - 1:9.11.5.P1+dfsg-1ubuntu2.5

External links

http://usn.ubuntu.com/4197-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###