F5 Networks BIG-IP : BIND vulnerability (K08613310)
Medium Nessus Plugin ID 118626
SynopsisThe remote device is missing a vendor-supplied security patch.
DescriptionBIND was improperly sequencing cleanup operations on upstream recursion fetch contexts, leading in some cases to a use-after-free error that can trigger an assertion failure and crash in named.
A remote attacker can use this flaw to make named , acting as a Domain Name System Security Extensions (DNSSEC) validating resolver, exit unexpectedly with an assertion failure by way of a specially crafted DNS request.
This vulnerability affects BIND only when configured as a recursive resolver with DNSSEC validation enabled. That mode of operation is not present in any default configuration but can be enabled.
ARX, Enterprise Manager, BIG-IQ, F5 iWorkflow, LineRate, and Traffix
There is no impact; these F5 products are not affected by this vulnerability.
SolutionUpgrade to one of the non-vulnerable versions listed in the F5 Solution K08613310.