[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249966

 
 

909

 
 

195636

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

bind: TCP-pipelined queries can bypass tcp-clients limit (CVE-2019-6477)

ID: oval:org.secpod.oval:def:1802066Date: (C)2022-03-25   (M)2023-11-10
Class: PATCHFamily: unix




By design, BIND is intended to limit the number of TCP clients that can be connected at any given time. The update to this functionality introduced by CVE-2018-5743 changed how BIND calculates the number of concurrent TCP clients from counting the outstanding TCP queries to counting the TCP client connections. On a server with TCP-pipelining capability, it is possible for one TCP client to send a large number of DNS requests over a single connection. Each outstanding query will be handled internally as an independent client request, thus bypassing the new TCP clients limit.

Platform:
Alpine Linux 3.10
Alpine Linux 3.11
Alpine Linux 3.12
Alpine Linux 3.13
Alpine Linux 3.14
Alpine Linux 3.15
Product:
bind
Reference:
10970
CVE-2019-6477
CVE-2018-5743
CVE    2
CVE-2018-5743
CVE-2019-6477
CPE    6
cpe:/a:isc:bind:9.11.5:s6:~~supported_preview~~~
cpe:/o:alpinelinux:alpine_linux:3.11
cpe:/o:alpinelinux:alpine_linux:3.10
cpe:/a:isc:bind
...

© SecPod Technologies