Lucene search

K
nessusThis script is Copyright (C) 2019-2023 and is owned by Tenable, Inc. or an Affiliate thereof.F5_BIGIP_SOL74009656.NASL
HistoryJul 03, 2019 - 12:00 a.m.

F5 Networks BIG-IP : BIND vulnerability (K74009656)

2019-07-0300:00:00
This script is Copyright (C) 2019-2023 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
18

7.8 High

AI Score

Confidence

High

By design, BIND is intended to limit the number of TCP clients that can be connected at any given time. The number of allowed connections is a tunable parameter which, if unset, defaults to a conservative value for most servers. Unfortunately, the code which was intended to limit the number of simultaneous connections contained an error which could be exploited to grow the number of simultaneous connections beyond this limit. Versions affected: BIND 9.9.0 -> 9.10.8-P1, 9.11.0

-> 9.11.6, 9.12.0 -> 9.12.4, 9.14.0. BIND 9 Supported Preview Edition versions 9.9.3-S1 -> 9.11.5-S3, and 9.11.5-S5. Versions 9.13.0 -> 9.13.7 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2018-5743. (CVE-2018-5743)

Impact

BIG-IP / BIG-IQ / Enterprise Manager / F5 iWorkflow

An attacker may exhaust file descriptors available to the named process; as a result, network connections and the management of log files or zone journal files may be affected. In BIG-IQ / Enterprise Manager / F5 iWorkflow standard and default configurations, exposure is limited to localhost , and there is no remote exposure.

Traffix SDC

There is no impact; this F5 product is not affected by this vulnerability.

#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from F5 Networks BIG-IP Solution K74009656.
#
# The text description of this plugin is (C) F5 Networks.
#

include('compat.inc');

if (description)
{
  script_id(126448);
  script_version("1.9");
  script_set_attribute(attribute:"plugin_modification_date", value:"2023/11/03");

  script_cve_id("CVE-2018-5743");

  script_name(english:"F5 Networks BIG-IP : BIND vulnerability (K74009656)");

  script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch.");
  script_set_attribute(attribute:"description", value:
"By design, BIND is intended to limit the number of TCP clients that
can be connected at any given time. The number of allowed connections
is a tunable parameter which, if unset, defaults to a conservative
value for most servers. Unfortunately, the code which was intended to
limit the number of simultaneous connections contained an error which
could be exploited to grow the number of simultaneous connections
beyond this limit. Versions affected: BIND 9.9.0 -> 9.10.8-P1, 9.11.0

-> 9.11.6, 9.12.0 -> 9.12.4, 9.14.0. BIND 9 Supported Preview Edition
versions 9.9.3-S1 -> 9.11.5-S3, and 9.11.5-S5. Versions 9.13.0 ->
9.13.7 of the 9.13 development branch are also affected. Versions
prior to BIND 9.9.0 have not been evaluated for vulnerability to
CVE-2018-5743. (CVE-2018-5743)

Impact

BIG-IP / BIG-IQ / Enterprise Manager / F5 iWorkflow

An attacker may exhaust file descriptors available to the named
process; as a result, network connections and the management of log
files or zone journal files may be affected. In BIG-IQ / Enterprise
Manager / F5 iWorkflow standard and default configurations, exposure
is limited to localhost , and there is no remote exposure.

Traffix SDC

There is no impact; this F5 product is not affected by this
vulnerability.");
  script_set_attribute(attribute:"see_also", value:"https://my.f5.com/manage/s/article/K74009656");
  script_set_attribute(attribute:"solution", value:
"Upgrade to one of the non-vulnerable versions listed in the F5 Solution K74009656.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2018-5743");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");

  script_set_attribute(attribute:"vuln_publication_date", value:"2019/10/09");
  script_set_attribute(attribute:"patch_publication_date", value:"2019/04/25");
  script_set_attribute(attribute:"plugin_publication_date", value:"2019/07/03");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_access_policy_manager");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_advanced_firewall_manager");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_application_acceleration_manager");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_application_security_manager");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_application_visibility_and_reporting");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_domain_name_system");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_global_traffic_manager");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_link_controller");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_local_traffic_manager");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_policy_enforcement_manager");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_webaccelerator");
  script_set_attribute(attribute:"cpe", value:"cpe:/h:f5:big-ip");
  script_set_attribute(attribute:"generated_plugin", value:"current");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"F5 Networks Local Security Checks");

  script_copyright(english:"This script is Copyright (C) 2019-2023 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("f5_bigip_detect.nbin");
  script_require_keys("Host/local_checks_enabled", "Host/BIG-IP/hotfix", "Host/BIG-IP/modules", "Host/BIG-IP/version");

  exit(0);
}


include('f5_func.inc');

if ( ! get_kb_item('Host/local_checks_enabled') ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
var version = get_kb_item('Host/BIG-IP/version');
if ( ! version ) audit(AUDIT_OS_NOT, 'F5 Networks BIG-IP');
if ( isnull(get_kb_item('Host/BIG-IP/hotfix')) ) audit(AUDIT_KB_MISSING, 'Host/BIG-IP/hotfix');
if ( ! get_kb_item('Host/BIG-IP/modules') ) audit(AUDIT_KB_MISSING, 'Host/BIG-IP/modules');

var sol = 'K74009656';
var vmatrix = {
  'AFM': {
    'affected': [
      '15.0.0','14.0.0-14.1.0','13.0.0-13.1.1','12.1.0-12.1.4','11.5.2-11.6.5'
    ],
    'unaffected': [
      '15.1.0','15.0.1','14.1.0.6','14.0.0.5','13.1.3','12.1.5','11.6.5.1'
    ],
  },
  'AM': {
    'affected': [
      '15.0.0','14.0.0-14.1.0','13.0.0-13.1.1','12.1.0-12.1.4','11.5.2-11.6.5'
    ],
    'unaffected': [
      '15.1.0','15.0.1','14.1.0.6','14.0.0.5','13.1.3','12.1.5','11.6.5.1'
    ],
  },
  'APM': {
    'affected': [
      '15.0.0','14.0.0-14.1.0','13.0.0-13.1.1','12.1.0-12.1.4','11.5.2-11.6.5'
    ],
    'unaffected': [
      '15.1.0','15.0.1','14.1.0.6','14.0.0.5','13.1.3','12.1.5','11.6.5.1'
    ],
  },
  'ASM': {
    'affected': [
      '15.0.0','14.0.0-14.1.0','13.0.0-13.1.1','12.1.0-12.1.4','11.5.2-11.6.5'
    ],
    'unaffected': [
      '15.1.0','15.0.1','14.1.0.6','14.0.0.5','13.1.3','12.1.5','11.6.5.1'
    ],
  },
  'AVR': {
    'affected': [
      '15.0.0','14.0.0-14.1.0','13.0.0-13.1.1','12.1.0-12.1.4','11.5.2-11.6.5'
    ],
    'unaffected': [
      '15.1.0','15.0.1','14.1.0.6','14.0.0.5','13.1.3','12.1.5','11.6.5.1'
    ],
  },
  'DNS': {
    'affected': [
      '15.0.0','14.0.0-14.1.0','13.0.0-13.1.1','12.1.0-12.1.4','11.5.2-11.6.5'
    ],
    'unaffected': [
      '15.1.0','15.0.1','14.1.0.6','14.0.0.5','13.1.3','12.1.5','11.6.5.1'
    ],
  },
  'GTM': {
    'affected': [
      '15.0.0','14.0.0-14.1.0','13.0.0-13.1.1','12.1.0-12.1.4','11.5.2-11.6.5'
    ],
    'unaffected': [
      '15.1.0','15.0.1','14.1.0.6','14.0.0.5','13.1.3','12.1.5','11.6.5.1'
    ],
  },
  'LC': {
    'affected': [
      '15.0.0','14.0.0-14.1.0','13.0.0-13.1.1','12.1.0-12.1.4','11.5.2-11.6.5'
    ],
    'unaffected': [
      '15.1.0','15.0.1','14.1.0.6','14.0.0.5','13.1.3','12.1.5','11.6.5.1'
    ],
  },
  'LTM': {
    'affected': [
      '15.0.0','14.0.0-14.1.0','13.0.0-13.1.1','12.1.0-12.1.4','11.5.2-11.6.5'
    ],
    'unaffected': [
      '15.1.0','15.0.1','14.1.0.6','14.0.0.5','13.1.3','12.1.5','11.6.5.1'
    ],
  },
  'PEM': {
    'affected': [
      '15.0.0','14.0.0-14.1.0','13.0.0-13.1.1','12.1.0-12.1.4','11.5.2-11.6.5'
    ],
    'unaffected': [
      '15.1.0','15.0.1','14.1.0.6','14.0.0.5','13.1.3','12.1.5','11.6.5.1'
    ],
  },
  'WAM': {
    'affected': [
      '15.0.0','14.0.0-14.1.0','13.0.0-13.1.1','12.1.0-12.1.4','11.5.2-11.6.5'
    ],
    'unaffected': [
      '15.1.0','15.0.1','14.1.0.6','14.0.0.5','13.1.3','12.1.5','11.6.5.1'
    ],
  }
};

if (bigip_is_affected(vmatrix:vmatrix, sol:sol))
{
  var extra = NULL;
  if (report_verbosity > 0) extra = bigip_report_get();
  security_report_v4(
      port       : 0,
      severity   : SECURITY_WARNING,
      extra      : extra
  );
}
else
{
  var tested = bigip_get_tested_modules();
  var audit_extra = 'For BIG-IP module(s) ' + tested + ',';
  if (tested) audit(AUDIT_INST_VER_NOT_VULN, audit_extra, version);
  else audit(AUDIT_HOST_NOT, 'running any of the affected modules');
}
VendorProductVersionCPE
f5big-ip_access_policy_managercpe:/a:f5:big-ip_access_policy_manager
f5big-ip_advanced_firewall_managercpe:/a:f5:big-ip_advanced_firewall_manager
f5big-ip_application_acceleration_managercpe:/a:f5:big-ip_application_acceleration_manager
f5big-ip_application_security_managercpe:/a:f5:big-ip_application_security_manager
f5big-ip_application_visibility_and_reportingcpe:/a:f5:big-ip_application_visibility_and_reporting
f5big-ip_domain_name_systemcpe:/a:f5:big-ip_domain_name_system
f5big-ip_global_traffic_managercpe:/a:f5:big-ip_global_traffic_manager
f5big-ip_link_controllercpe:/a:f5:big-ip_link_controller
f5big-ip_local_traffic_managercpe:/a:f5:big-ip_local_traffic_manager
f5big-ip_policy_enforcement_managercpe:/a:f5:big-ip_policy_enforcement_manager
Rows per page:
1-10 of 121