Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.142320
Category:Denial of Service
Title:ISC BIND DoS Vulnerability (CVE-2018-5743) - Linux
Summary:ISC BIND is prone to a denial of service vulnerability due to ineffective; simultaneous TCP client limiting.
Description:Summary:
ISC BIND is prone to a denial of service vulnerability due to ineffective
simultaneous TCP client limiting.

Vulnerability Insight:
By design, BIND is intended to limit the number of TCP clients that can be
connected at any given time. The number of allowed connections is a tunable parameter which, if unset, defaults
to a conservative value for most servers. Unfortunately, the code which was intended to limit the number of
simultaneous connections contains an error which can be exploited to grow the number of simultaneous connections
beyond this limit.

Vulnerability Impact:
By exploiting the failure to limit simultaneous TCP connections, an attacker
can deliberately exhaust the pool of file descriptors available to named, potentially affecting network
connections and the management of files such as log files or zone journal files.

In cases where the named process is not limited by OS-enforced per-process limits, this could additionally
potentially lead to exhaustion of all available free file descriptors on that system.

Affected Software/OS:
BIND 9.9.0 to 9.10.8-P1, 9.11.0 to 9.11.6, 9.12.0 to 9.12.4, 9.14.0. BIND 9
Supported Preview Edition versions 9.9.3-S1 to 9.11.5-S3, and 9.11.5-S5. Versions 9.13.0 to 9.13.7 of the 9.13
development branch.

Solution:
Update to version 9.11.6-P1, 9.12.4-P1, 9.14.1, 9.11.5-S6, 9.11.6-S1 or later.

CVSS Score:
4.3

CVSS Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2018-5743
CopyrightCopyright (C) 2019 Greenbone Networks GmbH

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.