Логотип exploitDog
bind:"CVE-2018-5743"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2018-5743"

Количество 15

Количество 15

ubuntu логотип

CVE-2018-5743

больше 6 лет назад

By design, BIND is intended to limit the number of TCP clients that can be connected at any given time. The number of allowed connections is a tunable parameter which, if unset, defaults to a conservative value for most servers. Unfortunately, the code which was intended to limit the number of simultaneous connections contained an error which could be exploited to grow the number of simultaneous connections beyond this limit. Versions affected: BIND 9.9.0 -> 9.10.8-P1, 9.11.0 -> 9.11.6, 9.12.0 -> 9.12.4, 9.14.0. BIND 9 Supported Preview Edition versions 9.9.3-S1 -> 9.11.5-S3, and 9.11.5-S5. Versions 9.13.0 -> 9.13.7 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2018-5743.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2018-5743

почти 7 лет назад

By design, BIND is intended to limit the number of TCP clients that can be connected at any given time. The number of allowed connections is a tunable parameter which, if unset, defaults to a conservative value for most servers. Unfortunately, the code which was intended to limit the number of simultaneous connections contained an error which could be exploited to grow the number of simultaneous connections beyond this limit. Versions affected: BIND 9.9.0 -> 9.10.8-P1, 9.11.0 -> 9.11.6, 9.12.0 -> 9.12.4, 9.14.0. BIND 9 Supported Preview Edition versions 9.9.3-S1 -> 9.11.5-S3, and 9.11.5-S5. Versions 9.13.0 -> 9.13.7 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2018-5743.

CVSS3: 8.6
EPSS: Низкий
nvd логотип

CVE-2018-5743

больше 6 лет назад

By design, BIND is intended to limit the number of TCP clients that can be connected at any given time. The number of allowed connections is a tunable parameter which, if unset, defaults to a conservative value for most servers. Unfortunately, the code which was intended to limit the number of simultaneous connections contained an error which could be exploited to grow the number of simultaneous connections beyond this limit. Versions affected: BIND 9.9.0 -> 9.10.8-P1, 9.11.0 -> 9.11.6, 9.12.0 -> 9.12.4, 9.14.0. BIND 9 Supported Preview Edition versions 9.9.3-S1 -> 9.11.5-S3, and 9.11.5-S5. Versions 9.13.0 -> 9.13.7 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2018-5743.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2018-5743

больше 6 лет назад

By design, BIND is intended to limit the number of TCP clients that ca ...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-3cr4-c5wq-3ccv

больше 3 лет назад

By design, BIND is intended to limit the number of TCP clients that can be connected at any given time. The number of allowed connections is a tunable parameter which, if unset, defaults to a conservative value for most servers. Unfortunately, the code which was intended to limit the number of simultaneous connections contained an error which could be exploited to grow the number of simultaneous connections beyond this limit. Versions affected: BIND 9.9.0 -> 9.10.8-P1, 9.11.0 -> 9.11.6, 9.12.0 -> 9.12.4, 9.14.0. BIND 9 Supported Preview Edition versions 9.9.3-S1 -> 9.11.5-S3, and 9.11.5-S5. Versions 9.13.0 -> 9.13.7 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2018-5743.

CVSS3: 7.5
EPSS: Низкий
oracle-oval логотип

ELSA-2019-1492

больше 6 лет назад

ELSA-2019-1492: bind security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2019-1294

больше 6 лет назад

ELSA-2019-1294: bind security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2019-1145

больше 6 лет назад

ELSA-2019-1145: bind security update (IMPORTANT)

EPSS: Низкий
fstec логотип

BDU:2020-01402

больше 6 лет назад

Уязвимость функции managed-keys сервера DNS BIND, связанная с неограниченным распределением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 4.9
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:1533-1

больше 6 лет назад

Security update for bind

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:1532-1

больше 6 лет назад

Security update for bind

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:1449-1

больше 6 лет назад

Security update for bind

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:14074-1

больше 6 лет назад

Security update for bind

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:1407-1

больше 6 лет назад

Security update for bind

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:2502-1

больше 6 лет назад

Security update for bind

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2018-5743

By design, BIND is intended to limit the number of TCP clients that can be connected at any given time. The number of allowed connections is a tunable parameter which, if unset, defaults to a conservative value for most servers. Unfortunately, the code which was intended to limit the number of simultaneous connections contained an error which could be exploited to grow the number of simultaneous connections beyond this limit. Versions affected: BIND 9.9.0 -> 9.10.8-P1, 9.11.0 -> 9.11.6, 9.12.0 -> 9.12.4, 9.14.0. BIND 9 Supported Preview Edition versions 9.9.3-S1 -> 9.11.5-S3, and 9.11.5-S5. Versions 9.13.0 -> 9.13.7 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2018-5743.

CVSS3: 7.5
2%
Низкий
больше 6 лет назад
redhat логотип
CVE-2018-5743

By design, BIND is intended to limit the number of TCP clients that can be connected at any given time. The number of allowed connections is a tunable parameter which, if unset, defaults to a conservative value for most servers. Unfortunately, the code which was intended to limit the number of simultaneous connections contained an error which could be exploited to grow the number of simultaneous connections beyond this limit. Versions affected: BIND 9.9.0 -> 9.10.8-P1, 9.11.0 -> 9.11.6, 9.12.0 -> 9.12.4, 9.14.0. BIND 9 Supported Preview Edition versions 9.9.3-S1 -> 9.11.5-S3, and 9.11.5-S5. Versions 9.13.0 -> 9.13.7 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2018-5743.

CVSS3: 8.6
2%
Низкий
почти 7 лет назад
nvd логотип
CVE-2018-5743

By design, BIND is intended to limit the number of TCP clients that can be connected at any given time. The number of allowed connections is a tunable parameter which, if unset, defaults to a conservative value for most servers. Unfortunately, the code which was intended to limit the number of simultaneous connections contained an error which could be exploited to grow the number of simultaneous connections beyond this limit. Versions affected: BIND 9.9.0 -> 9.10.8-P1, 9.11.0 -> 9.11.6, 9.12.0 -> 9.12.4, 9.14.0. BIND 9 Supported Preview Edition versions 9.9.3-S1 -> 9.11.5-S3, and 9.11.5-S5. Versions 9.13.0 -> 9.13.7 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2018-5743.

CVSS3: 7.5
2%
Низкий
больше 6 лет назад
debian логотип
CVE-2018-5743

By design, BIND is intended to limit the number of TCP clients that ca ...

CVSS3: 7.5
2%
Низкий
больше 6 лет назад
github логотип
GHSA-3cr4-c5wq-3ccv

By design, BIND is intended to limit the number of TCP clients that can be connected at any given time. The number of allowed connections is a tunable parameter which, if unset, defaults to a conservative value for most servers. Unfortunately, the code which was intended to limit the number of simultaneous connections contained an error which could be exploited to grow the number of simultaneous connections beyond this limit. Versions affected: BIND 9.9.0 -> 9.10.8-P1, 9.11.0 -> 9.11.6, 9.12.0 -> 9.12.4, 9.14.0. BIND 9 Supported Preview Edition versions 9.9.3-S1 -> 9.11.5-S3, and 9.11.5-S5. Versions 9.13.0 -> 9.13.7 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2018-5743.

CVSS3: 7.5
2%
Низкий
больше 3 лет назад
oracle-oval логотип
ELSA-2019-1492

ELSA-2019-1492: bind security update (IMPORTANT)

больше 6 лет назад
oracle-oval логотип
ELSA-2019-1294

ELSA-2019-1294: bind security update (IMPORTANT)

больше 6 лет назад
oracle-oval логотип
ELSA-2019-1145

ELSA-2019-1145: bind security update (IMPORTANT)

больше 6 лет назад
fstec логотип
BDU:2020-01402

Уязвимость функции managed-keys сервера DNS BIND, связанная с неограниченным распределением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 4.9
2%
Низкий
больше 6 лет назад
suse-cvrf логотип
openSUSE-SU-2019:1533-1

Security update for bind

больше 6 лет назад
suse-cvrf логотип
openSUSE-SU-2019:1532-1

Security update for bind

больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:1449-1

Security update for bind

больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:14074-1

Security update for bind

больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:1407-1

Security update for bind

больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:2502-1

Security update for bind

больше 6 лет назад

Уязвимостей на страницу