F5 Networks BIG-IP : BIND vulnerability (K80533167)

Critical Nessus Plugin ID 97333

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

Under some conditions when using both DNS64 and RPZ to rewrite query responses, query processing can resume in an inconsistent state leading to either an INSIST assertion failure or an attempt to read through a NULL pointer. Affects BIND 9.8.8, 9.9.3-S1 -> 9.9.9-S7, 9.9.3 -> 9.9.9-P5, 9.9.10b1, 9.10.0 -> 9.10.4-P5, 9.10.5b1, 9.11.0 -> 9.11.0-P2, 9.11.1b1. (CVE-2015-3135)

BIG-IP configurations using DNS64 (the DNS IPv6 to IPv4 option configured in the DNS profile) and Response Policy Zone (RPZ) rewriting (in the BIND configuration) together are affected by this CVE.

Note : The DNS IPv6 to IPv4 option is disabled, by default, in the DNS profile.

Note : RPZ Rewriting is an optional BIND 9.x configuration that allows administrators to create DNS blacklists.

Impact

Remote attackers may be able to cause a BIND denial-of-service (DoS) attack by making a query for an AAAA record.

Solution

Upgrade to one of the non-vulnerable versions listed in the F5 Solution K80533167.

See Also

https://support.f5.com/csp/article/K80533167

Plugin Details

Severity: Critical

ID: 97333

File Name: f5_bigip_SOL80533167.nasl

Version: 3.14

Type: local

Published: 2017/02/23

Updated: 2019/02/11

Dependencies: 76940

Configuration: Enable paranoid mode

Risk Information

Risk Factor: Critical

CVSS v2.0

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSS v3.0

Base Score: 5.9

Temporal Score: 5.2

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:f5:big-ip_access_policy_manager, cpe:/a:f5:big-ip_advanced_firewall_manager, cpe:/a:f5:big-ip_application_acceleration_manager, cpe:/a:f5:big-ip_application_security_manager, cpe:/a:f5:big-ip_application_visibility_and_reporting, cpe:/a:f5:big-ip_global_traffic_manager, cpe:/a:f5:big-ip_link_controller, cpe:/a:f5:big-ip_local_traffic_manager, cpe:/a:f5:big-ip_policy_enforcement_manager, cpe:/h:f5:big-ip, cpe:/h:f5:big-ip_protocol_security_manager

Required KB Items: Host/local_checks_enabled, Host/BIG-IP/hotfix, Host/BIG-IP/modules, Host/BIG-IP/version, Settings/ParanoidReport

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2017/02/23

Vulnerability Publication Date: 2015/07/09

Reference Information

CVE: CVE-2015-3135, CVE-2017-3135

BID: 75592