Unknown
CVE-2019-6471
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2019-6471
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
A race condition which may occur when discarding malformed packets can result in BIND exiting due to a REQUIRE assertion failure in dispatch.c. Versions affected: BIND 9.11.0 –> 9.11.7, 9.12.0 –> 9.12.4-P1, 9.14.0 –> 9.14.2. Also all releases of the BIND 9.13 development branch and version 9.15.0 of the BIND 9.15 development branch and BIND Supported Preview Edition versions 9.11.3-S1 –> 9.11.7-S1.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
- f5,
- isc
Products
- big-ip access policy manager,
- big-ip access policy manager 14.0.0,
- big-ip access policy manager 14.1.0,
- big-ip access policy manager 15.0.0,
- big-ip advanced firewall manager,
- big-ip advanced firewall manager 14.0.0,
- big-ip advanced firewall manager 14.1.0,
- big-ip advanced firewall manager 15.0.0,
- big-ip analytics,
- big-ip analytics 14.0.0,
- big-ip analytics 14.1.0,
- big-ip analytics 15.0.0,
- big-ip application acceleration manager,
- big-ip application acceleration manager 14.0.0,
- big-ip application acceleration manager 14.1.0,
- big-ip application acceleration manager 15.0.0,
- big-ip application security manager,
- big-ip application security manager 14.0.0,
- big-ip application security manager 14.1.0,
- big-ip application security manager 15.0.0,
- big-ip domain name system,
- big-ip domain name system 14.0.0,
- big-ip domain name system 14.1.0,
- big-ip domain name system 15.0.0,
- big-ip domain name system 9.2.2,
- big-ip edge gateway,
- big-ip edge gateway 14.0.0,
- big-ip edge gateway 14.1.0,
- big-ip edge gateway 15.0.0,
- big-ip fraud protection service,
- big-ip fraud protection service 14.0.0,
- big-ip fraud protection service 14.1.0,
- big-ip fraud protection service 15.0.0,
- big-ip global traffic manager,
- big-ip global traffic manager 14.0.0,
- big-ip global traffic manager 14.1.0,
- big-ip global traffic manager 15.0.0,
- big-ip global traffic manager 9.2.2,
- big-ip link controller,
- big-ip link controller 14.0.0,
- big-ip link controller 14.1.0,
- big-ip link controller 15.0.0,
- big-ip link controller 9.2.2,
- big-ip local traffic manager,
- big-ip local traffic manager 14.0.0,
- big-ip local traffic manager 14.1.0,
- big-ip local traffic manager 15.0.0,
- big-ip policy enforcement manager,
- big-ip policy enforcement manager 14.0.0,
- big-ip policy enforcement manager 14.1.0,
- big-ip policy enforcement manager 15.0.0,
- big-ip policy enforcement manager 9.2.2,
- big-ip webaccelerator,
- big-ip webaccelerator 14.0.0,
- big-ip webaccelerator 14.1.0,
- big-ip webaccelerator 15.0.0,
- big-ip webaccelerator 9.2.2,
- big-iq centralized management,
- bind,
- bind 9.11.3,
- bind 9.11.7,
- bind 9.12.4,
- enterprise manager 3.1.1,
- iworkflow 2.3.0
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: