By design, BIND is intended to limit the number of TCP clients that can be connected at any given time. The number of allowed connections is a tunable parameter which, if unset, defaults to a conservative value for most servers. Unfortunately, the code which was intended to limit the number of simultaneous connections contained an error which could be exploited to grow the number of simultaneous connections beyond this limit. Versions affected: BIND 9.9.0 -> 9.10.8-P1, 9.11.0
-> 9.11.6, 9.12.0 -> 9.12.4, 9.14.0. BIND 9 Supported Preview Edition versions 9.9.3-S1 -> 9.11.5-S3, and 9.11.5-S5. Versions 9.13.0 -> 9.13.7 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2018-5743. (CVE-2018-5743)
Impact
BIG-IP / BIG-IQ / Enterprise Manager / F5 iWorkflow
An attacker may exhaust file descriptors available to the named process; as a result, network connections and the management of log files or zone journal files may be affected. In BIG-IQ / Enterprise Manager / F5 iWorkflow standard and default configurations, exposure is limited to localhost , and there is no remote exposure.
Traffix SDC
There is no impact; this F5 product is not affected by this vulnerability.
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from F5 Networks BIG-IP Solution K74009656.
#
# The text description of this plugin is (C) F5 Networks.
#
include('compat.inc');
if (description)
{
script_id(126448);
script_version("1.9");
script_set_attribute(attribute:"plugin_modification_date", value:"2023/11/03");
script_cve_id("CVE-2018-5743");
script_name(english:"F5 Networks BIG-IP : BIND vulnerability (K74009656)");
script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch.");
script_set_attribute(attribute:"description", value:
"By design, BIND is intended to limit the number of TCP clients that
can be connected at any given time. The number of allowed connections
is a tunable parameter which, if unset, defaults to a conservative
value for most servers. Unfortunately, the code which was intended to
limit the number of simultaneous connections contained an error which
could be exploited to grow the number of simultaneous connections
beyond this limit. Versions affected: BIND 9.9.0 -> 9.10.8-P1, 9.11.0
-> 9.11.6, 9.12.0 -> 9.12.4, 9.14.0. BIND 9 Supported Preview Edition
versions 9.9.3-S1 -> 9.11.5-S3, and 9.11.5-S5. Versions 9.13.0 ->
9.13.7 of the 9.13 development branch are also affected. Versions
prior to BIND 9.9.0 have not been evaluated for vulnerability to
CVE-2018-5743. (CVE-2018-5743)
Impact
BIG-IP / BIG-IQ / Enterprise Manager / F5 iWorkflow
An attacker may exhaust file descriptors available to the named
process; as a result, network connections and the management of log
files or zone journal files may be affected. In BIG-IQ / Enterprise
Manager / F5 iWorkflow standard and default configurations, exposure
is limited to localhost , and there is no remote exposure.
Traffix SDC
There is no impact; this F5 product is not affected by this
vulnerability.");
script_set_attribute(attribute:"see_also", value:"https://my.f5.com/manage/s/article/K74009656");
script_set_attribute(attribute:"solution", value:
"Upgrade to one of the non-vulnerable versions listed in the F5 Solution K74009656.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2018-5743");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"vuln_publication_date", value:"2019/10/09");
script_set_attribute(attribute:"patch_publication_date", value:"2019/04/25");
script_set_attribute(attribute:"plugin_publication_date", value:"2019/07/03");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_access_policy_manager");
script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_advanced_firewall_manager");
script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_application_acceleration_manager");
script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_application_security_manager");
script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_application_visibility_and_reporting");
script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_domain_name_system");
script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_global_traffic_manager");
script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_link_controller");
script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_local_traffic_manager");
script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_policy_enforcement_manager");
script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_webaccelerator");
script_set_attribute(attribute:"cpe", value:"cpe:/h:f5:big-ip");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"F5 Networks Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2019-2023 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("f5_bigip_detect.nbin");
script_require_keys("Host/local_checks_enabled", "Host/BIG-IP/hotfix", "Host/BIG-IP/modules", "Host/BIG-IP/version");
exit(0);
}
include('f5_func.inc');
if ( ! get_kb_item('Host/local_checks_enabled') ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
var version = get_kb_item('Host/BIG-IP/version');
if ( ! version ) audit(AUDIT_OS_NOT, 'F5 Networks BIG-IP');
if ( isnull(get_kb_item('Host/BIG-IP/hotfix')) ) audit(AUDIT_KB_MISSING, 'Host/BIG-IP/hotfix');
if ( ! get_kb_item('Host/BIG-IP/modules') ) audit(AUDIT_KB_MISSING, 'Host/BIG-IP/modules');
var sol = 'K74009656';
var vmatrix = {
'AFM': {
'affected': [
'15.0.0','14.0.0-14.1.0','13.0.0-13.1.1','12.1.0-12.1.4','11.5.2-11.6.5'
],
'unaffected': [
'15.1.0','15.0.1','14.1.0.6','14.0.0.5','13.1.3','12.1.5','11.6.5.1'
],
},
'AM': {
'affected': [
'15.0.0','14.0.0-14.1.0','13.0.0-13.1.1','12.1.0-12.1.4','11.5.2-11.6.5'
],
'unaffected': [
'15.1.0','15.0.1','14.1.0.6','14.0.0.5','13.1.3','12.1.5','11.6.5.1'
],
},
'APM': {
'affected': [
'15.0.0','14.0.0-14.1.0','13.0.0-13.1.1','12.1.0-12.1.4','11.5.2-11.6.5'
],
'unaffected': [
'15.1.0','15.0.1','14.1.0.6','14.0.0.5','13.1.3','12.1.5','11.6.5.1'
],
},
'ASM': {
'affected': [
'15.0.0','14.0.0-14.1.0','13.0.0-13.1.1','12.1.0-12.1.4','11.5.2-11.6.5'
],
'unaffected': [
'15.1.0','15.0.1','14.1.0.6','14.0.0.5','13.1.3','12.1.5','11.6.5.1'
],
},
'AVR': {
'affected': [
'15.0.0','14.0.0-14.1.0','13.0.0-13.1.1','12.1.0-12.1.4','11.5.2-11.6.5'
],
'unaffected': [
'15.1.0','15.0.1','14.1.0.6','14.0.0.5','13.1.3','12.1.5','11.6.5.1'
],
},
'DNS': {
'affected': [
'15.0.0','14.0.0-14.1.0','13.0.0-13.1.1','12.1.0-12.1.4','11.5.2-11.6.5'
],
'unaffected': [
'15.1.0','15.0.1','14.1.0.6','14.0.0.5','13.1.3','12.1.5','11.6.5.1'
],
},
'GTM': {
'affected': [
'15.0.0','14.0.0-14.1.0','13.0.0-13.1.1','12.1.0-12.1.4','11.5.2-11.6.5'
],
'unaffected': [
'15.1.0','15.0.1','14.1.0.6','14.0.0.5','13.1.3','12.1.5','11.6.5.1'
],
},
'LC': {
'affected': [
'15.0.0','14.0.0-14.1.0','13.0.0-13.1.1','12.1.0-12.1.4','11.5.2-11.6.5'
],
'unaffected': [
'15.1.0','15.0.1','14.1.0.6','14.0.0.5','13.1.3','12.1.5','11.6.5.1'
],
},
'LTM': {
'affected': [
'15.0.0','14.0.0-14.1.0','13.0.0-13.1.1','12.1.0-12.1.4','11.5.2-11.6.5'
],
'unaffected': [
'15.1.0','15.0.1','14.1.0.6','14.0.0.5','13.1.3','12.1.5','11.6.5.1'
],
},
'PEM': {
'affected': [
'15.0.0','14.0.0-14.1.0','13.0.0-13.1.1','12.1.0-12.1.4','11.5.2-11.6.5'
],
'unaffected': [
'15.1.0','15.0.1','14.1.0.6','14.0.0.5','13.1.3','12.1.5','11.6.5.1'
],
},
'WAM': {
'affected': [
'15.0.0','14.0.0-14.1.0','13.0.0-13.1.1','12.1.0-12.1.4','11.5.2-11.6.5'
],
'unaffected': [
'15.1.0','15.0.1','14.1.0.6','14.0.0.5','13.1.3','12.1.5','11.6.5.1'
],
}
};
if (bigip_is_affected(vmatrix:vmatrix, sol:sol))
{
var extra = NULL;
if (report_verbosity > 0) extra = bigip_report_get();
security_report_v4(
port : 0,
severity : SECURITY_WARNING,
extra : extra
);
}
else
{
var tested = bigip_get_tested_modules();
var audit_extra = 'For BIG-IP module(s) ' + tested + ',';
if (tested) audit(AUDIT_INST_VER_NOT_VULN, audit_extra, version);
else audit(AUDIT_HOST_NOT, 'running any of the affected modules');
}
Vendor | Product | Version | CPE |
---|---|---|---|
f5 | big-ip_access_policy_manager | cpe:/a:f5:big-ip_access_policy_manager | |
f5 | big-ip_advanced_firewall_manager | cpe:/a:f5:big-ip_advanced_firewall_manager | |
f5 | big-ip_application_acceleration_manager | cpe:/a:f5:big-ip_application_acceleration_manager | |
f5 | big-ip_application_security_manager | cpe:/a:f5:big-ip_application_security_manager | |
f5 | big-ip_application_visibility_and_reporting | cpe:/a:f5:big-ip_application_visibility_and_reporting | |
f5 | big-ip_domain_name_system | cpe:/a:f5:big-ip_domain_name_system | |
f5 | big-ip_global_traffic_manager | cpe:/a:f5:big-ip_global_traffic_manager | |
f5 | big-ip_link_controller | cpe:/a:f5:big-ip_link_controller | |
f5 | big-ip_local_traffic_manager | cpe:/a:f5:big-ip_local_traffic_manager | |
f5 | big-ip_policy_enforcement_manager | cpe:/a:f5:big-ip_policy_enforcement_manager |