F5 Networks BIG-IP : BIND vulnerability (K02663161)

medium Nessus Plugin ID 140615

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker on the network path for a TSIG-signed request, or operating the server receiving the TSIG-signed request, could send a truncated response to that request, triggering an assertion failure, causing the server to exit. Alternately, an off-path attacker would have to correctly guess when a TSIG-signed request was sent, along with other characteristics of the packet and message, and spoof a truncated response to trigger an assertion failure, causing the server to exit. (CVE-2020-8622)

Impact

This vulnerability affects systems that usethe BIND process. When an attacker sends or spoofs a truncated response to a TSIG-signed request received by the BIND process, the BIND process experiences an assertion failure and exits while attempting to verify the truncated response. As a result, the system experiences a denial-of-service (DoS) attack on the BIND process.

Solution

Upgrade to one of the non-vulnerable versions listed in the F5 Solution K02663161.

See Also

https://my.f5.com/manage/s/article/K02663161

Plugin Details

Severity: Medium

ID: 140615

File Name: f5_bigip_SOL02663161.nasl

Version: 1.11

Type: local

Published: 9/17/2020

Updated: 11/2/2023

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 4

Temporal Score: 3

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P

CVSS Score Source: CVE-2020-8622

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.7

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:f5:big-ip_link_controller, cpe:/a:f5:big-ip_application_visibility_and_reporting, cpe:/a:f5:big-ip_domain_name_system, cpe:/a:f5:big-ip_policy_enforcement_manager, cpe:/h:f5:big-ip, cpe:/a:f5:big-ip_application_security_manager, cpe:/a:f5:big-ip_advanced_firewall_manager, cpe:/a:f5:big-ip_local_traffic_manager, cpe:/a:f5:big-ip_access_policy_manager, cpe:/a:f5:big-ip_global_traffic_manager, cpe:/a:f5:big-ip_application_acceleration_manager

Required KB Items: Host/local_checks_enabled, Host/BIG-IP/hotfix, Host/BIG-IP/modules, Host/BIG-IP/version

Exploit Ease: No known exploits are available

Patch Publication Date: 8/27/2020

Vulnerability Publication Date: 8/21/2020

Reference Information

CVE: CVE-2020-8622

IAVA: 2020-A-0385-S