SOL6365 - Multiple DNS vulnerabilities VU#955777

2006-05-04T00:00:00
ID SOL6365
Type f5
Reporter f5
Modified 2016-07-01T00:00:00

Description

Vulnerability description

This security advisory describes several potential vulnerabilities in Internet Systems Consortium's Berkeley Internet Name Daemon (BIND). BIND is provided on some F5 Networks products. The potential vulnerabilities include: execution of arbitrary code, denial of service, and other unpredictable behavior.

BIND is only vulnerable when Secret Key Transaction Authentication (TSIG) is enabled. TSIG is disabled by default on all F5 products. As such, you are only at risk if you explicitly enabled this feature on your F5 Networks product.

Information about this advisory is available at the following location:

<http://www.kb.cert.org/vuls/id/955777>

F5 Product Development tracked this issue as CR63215 and it was fixed in BIG-IP 9.4.2. For information about upgrading, refer to the BIG-IP LTM, GTM, ASM, Link Controller, or WebAccelerator Release Notes.