Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.142320
Categoría:Denial of Service
Título:ISC BIND DoS Vulnerability (CVE-2018-5743) - Linux
Resumen:ISC BIND is prone to a denial of service vulnerability due to ineffective; simultaneous TCP client limiting.
Descripción:Summary:
ISC BIND is prone to a denial of service vulnerability due to ineffective
simultaneous TCP client limiting.

Vulnerability Insight:
By design, BIND is intended to limit the number of TCP clients that can be
connected at any given time. The number of allowed connections is a tunable parameter which, if unset, defaults
to a conservative value for most servers. Unfortunately, the code which was intended to limit the number of
simultaneous connections contains an error which can be exploited to grow the number of simultaneous connections
beyond this limit.

Vulnerability Impact:
By exploiting the failure to limit simultaneous TCP connections, an attacker
can deliberately exhaust the pool of file descriptors available to named, potentially affecting network
connections and the management of files such as log files or zone journal files.

In cases where the named process is not limited by OS-enforced per-process limits, this could additionally
potentially lead to exhaustion of all available free file descriptors on that system.

Affected Software/OS:
BIND 9.9.0 to 9.10.8-P1, 9.11.0 to 9.11.6, 9.12.0 to 9.12.4, 9.14.0. BIND 9
Supported Preview Edition versions 9.9.3-S1 to 9.11.5-S3, and 9.11.5-S5. Versions 9.13.0 to 9.13.7 of the 9.13
development branch.

Solution:
Update to version 9.11.6-P1, 9.12.4-P1, 9.14.1, 9.11.5-S6, 9.11.6-S1 or later.

CVSS Score:
4.3

CVSS Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2018-5743
CopyrightCopyright (C) 2019 Greenbone Networks GmbH

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.