CVE-2018-5743 (retired)

By design, BIND is intended to limit the number of TCP clients that can be
connected at any given time. The number of allowed connections is a tunable
parameter which, if unset, defaults to a conservative value for most
servers. Unfortunately, the code which was intended to limit the number of
simultaneous connections contained an error which could be exploited to
grow the number of simultaneous connections beyond this limit. Versions
affected: BIND 9.9.0 -> 9.10.8-P1, 9.11.0 -> 9.11.6, 9.12.0 -> 9.12.4,
9.14.0. BIND 9 Supported Preview Edition versions 9.9.3-S1 -> 9.11.5-S3,
and 9.11.5-S5. Versions 9.13.0 -> 9.13.7 of the 9.13 development branch are
also affected. Versions prior to BIND 9.9.0 have not been evaluated for
vulnerability to CVE-2018-5743.
Source: bind9 (LP Ubuntu Debian)
Ubuntu 12.04 ESM (Precise Pangolin):released (1:9.8.1.dfsg.P1-4ubuntu0.28)
Ubuntu 14.04 ESM (Trusty Tahr):released (1:9.9.5.dfsg-3ubuntu0.19+esm1)
Ubuntu 16.04 LTS (Xenial Xerus):released (1:9.10.3.dfsg.P4-8ubuntu1.14)
Ubuntu 18.04 LTS (Bionic Beaver):released (1:9.11.3+dfsg-1ubuntu1.7)
Ubuntu 19.04 (Disco Dingo):released (1:9.11.5.P1+dfsg-1ubuntu2.3)
Ubuntu 19.10 (Eoan):released (1:9.11.5.P1+dfsg-1ubuntu3)
More Information

Updated: 2019-10-16 03:15:08 UTC (commit d5a77adc0692243c8830819b93e10d519bb68b0e)