Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-5743— Limiting simultaneous TCP clients was ineffective

EPSS 5.69% · P90
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2018-5743

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Limiting simultaneous TCP clients was ineffective
Source: NVD (National Vulnerability Database)
Vulnerability Description
By design, BIND is intended to limit the number of TCP clients that can be connected at any given time. The number of allowed connections is a tunable parameter which, if unset, defaults to a conservative value for most servers. Unfortunately, the code which was intended to limit the number of simultaneous connections contained an error which could be exploited to grow the number of simultaneous connections beyond this limit. Versions affected: BIND 9.9.0 -> 9.10.8-P1, 9.11.0 -> 9.11.6, 9.12.0 -> 9.12.4, 9.14.0. BIND 9 Supported Preview Edition versions 9.9.3-S1 -> 9.11.5-S3, and 9.11.5-S5. Versions 9.13.0 -> 9.13.7 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2018-5743.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
ISC BIND 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
ISC BIND是美国ISC公司的一套实现了DNS协议的开源软件。 ISC BIND中存在安全漏洞,该漏洞源于程序没有充分地限制TCP客户端同时连接的个数。攻击者可利用该漏洞耗尽文件描述符,影响网络连接和文件管理。以下版本受到影响:BIND 9.9.0版本至9.10.8-P1版本,9.11.0版本至9.11.6版本,9.12.0版本至9.12.4版本,9.14.0版本,9.13.0版本至9.13.7版本(9.13 development branch),BIND 9 Supported Preview E
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
ISCBIND 9 BIND 9.9.0 -> 9.10.8-P1, 9.11.0 -> 9.11.6, 9.12.0 -> 9.12.4, 9.14.0. BIND 9 Supported Preview Edition versions 9.9.3-S1 -> 9.11.5-S3, and 9.11.5-S5. Versions 9.13.0 -> 9.13.7 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 h -

II. Public POCs for CVE-2018-5743

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2018-5743

登录查看更多情报信息。

Same Patch Batch · ISC · 2019-10-09 · 9 CVEs total

CVE-2018-5732A specially constructed response from a malicious server can cause a buffer overflow in dh
CVE-2018-5744A specially crafted packet can cause named to leak memory
CVE-2018-5745An assertion failure can occur if a trust anchor rolls over to an unsupported key algorith
CVE-2019-6465Zone transfer controls for writable DLZ zones were not effective
CVE-2019-6467An error in the nxdomain redirect feature can cause BIND to exit with an INSIST assertion
CVE-2019-6468BIND Supported Preview Edition can exit with an assertion failure if nxdomain-redirect is
CVE-2019-6469BIND Supported Preview Edition can exit with an assertion failure if ECS is in use
CVE-2019-6471A race condition when discarding malformed packets can cause BIND to exit with an assertio

IV. Related Vulnerabilities

V. Comments for CVE-2018-5743

No comments yet


Leave a comment