Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2019-6477 |
CWE-ID | CWE-399 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
bind (Alpine package) Operating systems & Components / Operating system package or component |
Vendor | Alpine Linux Development Team |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU22894
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2019-6477
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect implementation of TCP-pipelining feature in ISC BIND, aimed to limit the number of concurrent connections and protect the server from denial of service attacks. A remote attacker can initiate a TCP-pipelined connection with multiple queries that consume more resources than the server has been provisioned to handle and crash the server, when closing the connection.
Install update from vendor's website.
Vulnerable software versionsbind (Alpine package): 9.11.5-r0 - 9.14.7-r0
CPE2.3http://git.alpinelinux.org/aports/commit/?id=f415ad5b8bc9e3fb57d3f950785b0203d7eee934
http://git.alpinelinux.org/aports/commit/?id=ff7db7c636342b669dde2b034e9c8c887cb9ee90
http://git.alpinelinux.org/aports/commit/?id=85f2bc39b0cdf3fbb1804e1bde6a0f1570c8931d
http://git.alpinelinux.org/aports/commit/?id=9e6955f54ef0ef060d47afd63899a6d9379a6edf
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.