SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Embedded Server/Appliance)  >   F5 Enterprise Manager Vendors:   F5 Networks
(F5 Issues Advisory for F5 Enterprise Manager) BIND Bug in 'buffer.c' Constructing Query Responses Lets Remote Users Cause the Target Service to Crash
SecurityTracker Alert ID:  1036921
SecurityTracker URL:  http://securitytracker.com/id/1036921
CVE Reference:   CVE-2016-2776   (Links to External Site)
Updated:  Sep 29 2016
Original Entry Date:  Sep 29 2016
Impact:   Denial of service via network
Vendor Confirmed:  Yes  
Version(s): 3.1.1
Description:   A vulnerability was reported in BIND. A remote user can cause the target service to crash. F5 Enterprise Manager is affected.

A remote user can send a specially crafted query to trigger an error in 'buffer.c' in constructing a response to the query and cause the target service to crash.

Packets with a source address that does not match the 'allow-query' statement can also trigger this flaw.

Impact:   A remote user can cause the target service to crash.
Solution:   F5 Networks has issued an advisory for CVE-2016-2776 for F5 Enterprise Manager.

F5 Enterprise Manager is affected when manually configured to act as a DNS server.

F5 Networks has assigned ID 617869 to this vulnerability.

The F5 Networks advisory is available at:

http://support.f5.com/kb/en-us/solutions/public/k/18/sol18829561.html

Vendor URL:  support.f5.com/kb/en-us/solutions/public/k/18/sol18829561.html (Links to External Site)
Cause:   Not specified

Message History:   This archive entry is a follow-up to the message listed below.
Sep 27 2016 BIND Bug in 'buffer.c' Constructing Query Responses Lets Remote Users Cause the Target Service to Crash



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC