Resource management error in bind (Alpine package)



Published: 2019-11-21
Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2019-6477
CWE-ID CWE-399
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
bind (Alpine package)
Operating systems & Components / Operating system package or component

Vendor Alpine Linux Development Team

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Resource management error

EUVDB-ID: #VU22894

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-6477

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect implementation of TCP-pipelining feature in ISC BIND, aimed to limit the number of concurrent connections and protect the server from denial of service attacks. A remote attacker can initiate a TCP-pipelined connection with multiple queries that consume more resources than the server has been provisioned to handle and crash the server, when closing the connection.

Mitigation

Install update from vendor's website.

Vulnerable software versions

bind (Alpine package): 9.11.5-r0 - 9.14.7-r0

CPE2.3 External links

http://git.alpinelinux.org/aports/commit/?id=f415ad5b8bc9e3fb57d3f950785b0203d7eee934
http://git.alpinelinux.org/aports/commit/?id=ff7db7c636342b669dde2b034e9c8c887cb9ee90
http://git.alpinelinux.org/aports/commit/?id=85f2bc39b0cdf3fbb1804e1bde6a0f1570c8931d
http://git.alpinelinux.org/aports/commit/?id=9e6955f54ef0ef060d47afd63899a6d9379a6edf


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###