#VU32025 Allocation of Resources Without Limits or Throttling in ISC BIND - CVE-2018-5743

 

#VU32025 Allocation of Resources Without Limits or Throttling in ISC BIND - CVE-2018-5743

Published: October 9, 2019 / Updated: July 28, 2020


Vulnerability identifier: #VU32025
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2018-5743
CWE-ID: CWE-770
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
ISC BIND
Software vendor:
ISC

Description

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

By design, BIND is intended to limit the number of TCP clients that can be connected at any given time. The number of allowed connections is a tunable parameter which, if unset, defaults to a conservative value for most servers. Unfortunately, the code which was intended to limit the number of simultaneous connections contained an error which could be exploited to grow the number of simultaneous connections beyond this limit. Versions affected: BIND 9.9.0 -> 9.10.8-P1, 9.11.0 -> 9.11.6, 9.12.0 -> 9.12.4, 9.14.0. BIND 9 Supported Preview Edition versions 9.9.3-S1 -> 9.11.5-S3, and 9.11.5-S5. Versions 9.13.0 -> 9.13.7 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2018-5743.


Remediation

Install update from vendor's website.

External links