CVE-2019-6476 – An error in QNAME minimization code can cause BIND to exit with an assertion failure
https://notcve.org/view.php?id=CVE-2019-6476
A defect in code added to support QNAME minimization can cause named to exit with an assertion failure if a forwarder returns a referral rather than resolving the query. This affects BIND versions 9.14.0 up to 9.14.6, and 9.15.0 up to 9.15.4. Un defecto en el código agregado para soportar la minimización de QNAME puede causar que un nombrado salga con un error de aserción si un reenviador devuelve una referencia en lugar de resolver la consulta. Esto afecta a BIND versiones 9.14.0 hasta 9.14.6 y 9.15.0 hasta 9.15.4. • https://kb.isc.org/docs/cve-2019-6476 https://security.netapp.com/advisory/ntap-20191024-0004 https://support.f5.com/csp/article/K42238532?utm_source=f5support&%3Butm_medium=RSS • CWE-617: Reachable Assertion •
CVE-2019-6475 – A flaw in mirror zone validity checking can allow zone data to be spoofed
https://notcve.org/view.php?id=CVE-2019-6475
Mirror zones are a BIND feature allowing recursive servers to pre-cache zone data provided by other servers. A mirror zone is similar to a zone of type secondary, except that its data is subject to DNSSEC validation before being used in answers, as if it had been looked up via traditional recursion, and when mirror zone data cannot be validated, BIND falls back to using traditional recursion instead of the mirror zone. However, an error in the validity checks for the incoming zone data can allow an on-path attacker to replace zone data that was validated with a configured trust anchor with forged data of the attacker's choosing. The mirror zone feature is most often used to serve a local copy of the root zone. If an attacker was able to insert themselves into the network path between a recursive server using a mirror zone and a root name server, this vulnerability could then be used to cause the recursive server to accept a copy of falsified root zone data. • https://kb.isc.org/docs/cve-2019-6475 https://security.netapp.com/advisory/ntap-20191024-0004 https://support.f5.com/csp/article/K42238532?utm_source=f5support&%3Butm_medium=RSS • CWE-345: Insufficient Verification of Data Authenticity •
CVE-2019-6474 – A packet containing a malformed DUID can cause the kea-dhcp6 server to terminate
https://notcve.org/view.php?id=CVE-2019-6474
A missing check on incoming client requests can be exploited to cause a situation where the Kea server's lease storage contains leases which are rejected as invalid when the server tries to load leases from storage on restart. If the number of such leases exceeds a hard-coded limit in the Kea code, a server trying to restart will conclude that there is a problem with its lease store and give up. Versions affected: 1.4.0 to 1.5.0, 1.6.0-beta1, and 1.6.0-beta2 Una falta de comprobación en las peticiones de clientes entrantes puede ser explotadas para causar una situación en la que el almacenamiento arrendado del servidor Kea contiene arrendamientos que son rechazados como no válidos cuando el servidor intenta cargar arrendamientos del almacenamiento al reiniciar. Si el número de tales arrendamientos excede un límite codificado en el código Kea, un servidor que intente reiniciar concluirá que existe un problema con su almacén de arrendamientos y se dará por vencido. Versiones afectadas: 1.4.0 hasta 1.5.0, 1.6.0-beta1 y 1.6.0-beta2 • https://kb.isc.org/docs/cve-2019-6474 • CWE-772: Missing Release of Resource after Effective Lifetime •
CVE-2019-6472 – A packet containing a malformed DUID can cause the kea-dhcp6 server to terminate
https://notcve.org/view.php?id=CVE-2019-6472
A packet containing a malformed DUID can cause the Kea DHCPv6 server process (kea-dhcp6) to exit due to an assertion failure. Versions affected: 1.4.0 to 1.5.0, 1.6.0-beta1, and 1.6.0-beta2. Un paquete que contiene un DUID malformado puede hacer que el proceso del servidor Kea DHCPv6 (kea-dhcp6) se cierre debido a un error de aserción. Versiones afectadas: 1.4.0 hasta 1.5.0, 1.6.0-beta1 y 1.6.0-beta2. • https://kb.isc.org/docs/cve-2019-6472 • CWE-617: Reachable Assertion •
CVE-2019-6469 – BIND Supported Preview Edition can exit with an assertion failure if ECS is in use
https://notcve.org/view.php?id=CVE-2019-6469
An error in the EDNS Client Subnet (ECS) feature for recursive resolvers can cause BIND to exit with an assertion failure when processing a response that has malformed RRSIGs. Versions affected: BIND 9.10.5-S1 -> 9.11.6-S1 of BIND 9 Supported Preview Edition. Un error en la funcionalidad EDNS Client Subnet (ECS) para los solucionadores recursivos puede hacer que BIND salga con un fallo de aserción cuando se procesa una respuesta que tiene RRSIG malformados. Versiones afectadas: BIND 9.10.5-S1 hasta 9.11.6-S1 de BIND 9 Supported Preview Edition. • https://kb.isc.org/docs/cve-2019-6469 https://support.f5.com/csp/article/K39751401?utm_source=f5support&%3Butm_medium=RSS • CWE-617: Reachable Assertion •