SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Router/Bridge/Hub)  >   F5 BIG-IP Vendors:   F5 Networks
(F5 Networks Issues Advisory for F5 BIG-IP) ISC BIND TKEY Query Processing Flaw Lets Remote Users Cause the Target Service to Crash
SecurityTracker Alert ID:  1033102
SecurityTracker URL:  http://securitytracker.com/id/1033102
CVE Reference:   CVE-2015-5477   (Links to External Site)
Date:  Jul 29 2015
Impact:   Denial of service via network
Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in ISC BIND. A remote user can cause the target service to crash. F5 BIG-IP is affected in certain configurations.

A remote user can send a specially crafted TKEY query packet to trigger a REQUIRE assertion failure and cause the named service to crash. The flaw occurs prior to the access control list checks.

Recursive and authoritative servers are affected.

Jonathan Foote reported this vulnerability.

Impact:   A remote user can cause the target named service to crash.
Solution:   F5 Networks has issued an advisory for F5 BIG-IP.

F5 BIG-IP is affected if a self IP address or management IP address is configured to allow inbound connections on port 53.

The F5 Networks advisory is available at:

https://support.f5.com/kb/en-us/solutions/public/16000/900/sol16909.html

Vendor URL:  support.f5.com/kb/en-us/solutions/public/16000/900/sol16909.html (Links to External Site)
Cause:   Exception handling error

Message History:   This archive entry is a follow-up to the message listed below.
Jul 29 2015 ISC BIND TKEY Query Processing Flaw Lets Remote Users Cause the Target Service to Crash



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC