CVE-2018-5743

Priority
Description
By design, BIND is intended to limit the number of TCP clients that can be
connected at any given time. The number of allowed connections is a tunable
parameter which, if unset, defaults to a conservative value for most
servers. Unfortunately, the code which was intended to limit the number of
simultaneous connections contained an error which could be exploited to
grow the number of simultaneous connections beyond this limit. Versions
affected: BIND 9.9.0 -> 9.10.8-P1, 9.11.0 -> 9.11.6, 9.12.0 -> 9.12.4,
9.14.0. BIND 9 Supported Preview Edition versions 9.9.3-S1 -> 9.11.5-S3,
and 9.11.5-S5. Versions 9.13.0 -> 9.13.7 of the 9.13 development branch are
also affected. Versions prior to BIND 9.9.0 have not been evaluated for
vulnerability to CVE-2018-5743.
Assigned-to
mdeslaur
Notes
Package
Source: bind9 (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):released (1:9.8.1.dfsg.P1-4ubuntu0.28)
Ubuntu 14.04 ESM (Trusty Tahr):released (1:9.9.5.dfsg-3ubuntu0.19+esm1)
Ubuntu 16.04 LTS (Xenial Xerus):released (1:9.10.3.dfsg.P4-8ubuntu1.14)
Ubuntu 18.04 LTS (Bionic Beaver):released (1:9.11.3+dfsg-1ubuntu1.7)
More Information

Updated: 2020-09-10 05:59:00 UTC (commit 81a23a978c4436cd99e1d040e9e73e9146876281)