F5 Networks BIG-IP : BIND vulnerability (K62012529)

high Nessus Plugin ID 92986


The remote device is missing a vendor-supplied security patch.


named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted signature record for a DNAME record, related to db.c and resolver.c. (CVE-2016-1286)


An attacker may force the system to look up a malicious server that is serving bad RRSIGs and may cause the BIND service to restart.

Note : Typically, a BIND service restart does not cause the affected system to fail over.


Although BIG-IP software contains the vulnerable code, the BIG-IP system does not use the vulnerable code in a way that exposes the vulnerability in the default configuration. The BIG-IP system must meet both of the following conditions to be considered vulnerable :

A listener object is configured to use the local BIND service. For example :

A virtual server with a DNS profile is configured with the Use BIND Server on BIG-IP option (this option is enabled by default for the DNS profile).

A DNS/GTM pool uses the Return to DNS load balancing method, or its Alternate and Fallback load balancing methods are set to None, and all pools associated with the wide IP are unavailable.

The local BIND configuration is enabled with the non-default recursion yes; option.

BIG-IQ and Enterprise Manager

BIG-IQ and Enterprise Manager systems are not vulnerable in the default standard configurations. This vulnerability can be exposed only when the BIG-IQ or Enterprise Manager system is manually configured to enable recursion explicitly and act as a DNS server to query against a server that is providing malicious responses. F5 recommends that you do not configure the system so that you use the BIG-IQ or Enterprise Manager system as a DNS server.

ARX, FirePass, LineRate, F5 WebSafe, and Traffix SDC

There is no impact. These F5 products are not vulnerable to these vulnerabilities.


Upgrade to one of the non-vulnerable versions listed in the F5 Solution K62012529.

See Also


Plugin Details

Severity: High

ID: 92986

File Name: f5_bigip_SOL62012529.nasl

Version: 2.9

Type: local

Published: 8/17/2016

Updated: 1/4/2019

Configuration: Enable paranoid mode

Risk Information


Risk Factor: Medium

Score: 4.4


Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: E:U/RL:OF/RC:C


Risk Factor: High

Base Score: 8.6

Temporal Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

Temporal Vector: E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:f5:big-ip_access_policy_manager, cpe:/a:f5:big-ip_advanced_firewall_manager, cpe:/a:f5:big-ip_application_acceleration_manager, cpe:/a:f5:big-ip_application_security_manager, cpe:/a:f5:big-ip_application_visibility_and_reporting, cpe:/a:f5:big-ip_global_traffic_manager, cpe:/a:f5:big-ip_link_controller, cpe:/a:f5:big-ip_local_traffic_manager, cpe:/a:f5:big-ip_policy_enforcement_manager, cpe:/a:f5:big-ip_wan_optimization_manager, cpe:/a:f5:big-ip_webaccelerator, cpe:/h:f5:big-ip, cpe:/h:f5:big-ip_protocol_security_manager

Required KB Items: Host/local_checks_enabled, Host/BIG-IP/hotfix, Host/BIG-IP/modules, Host/BIG-IP/version, Settings/ParanoidReport

Exploit Ease: No known exploits are available

Patch Publication Date: 3/9/2016

Reference Information

CVE: CVE-2016-1286