Lucene search

K
f5F5SOL12986
HistoryJul 27, 2011 - 12:00 a.m.

SOL12986 - BIND vulnerability CVE-2011-2464

2011-07-2700:00:00
support.f5.com
23

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.058 Low

EPSS

Percentile

92.6%

Unspecified vulnerability in ISC BIND 9 9.6.x before 9.6-ESV-R4-P3, 9.7.x before 9.7.3-P3, and 9.8.x before 9.8.0-P4 allows remote attackers to cause a Denial of Service (DoS) (named daemon crash) by way of a crafted UPDATE request.

Information about this advisory is available at the following location: CVE-2011-2464

Note: This link takes you to a resource outside of AskF5, and it is possible that the information may be removed without our knowledge.

F5 Product Development tracked this issue as ID 363310 for the BIG-IP system, and it was fixed in BIG-IP 10.2.3 and 11.0.0. For more information about upgrading, refer to the BIG-IP LTM, GTM, ASM, Link Controller, WebAccelerator, PSM, WOM, APM and Edge Gateway release notes.

Additionally, this issue was fixed in Hotfix-BIGIP-10.2.2-HF1 issued for BIG-IP 10.2.2. You may download this hotfix, or later versions of the hotfix, from the F5 Downloads site.

For information about downloading software, refer to SOL167: Downloading software and firmware from F5.

For information about the F5 hotfix policy, refer to SOL4918: Overview of F5 critical issue hotfix policy.

For information about how to manage F5 product hotfixes, refer to SOL10025: Managing BIG-IP product hotfixes (10.x) and SOL6845: Managing BIG-IP product hotfixes (9.x).

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.058 Low

EPSS

Percentile

92.6%