First published: Wed Oct 09 2019(Updated: )
A race condition which may occur when discarding malformed packets can result in BIND exiting due to a REQUIRE assertion failure in dispatch.c. Versions affected: BIND 9.11.0 -> 9.11.7, 9.12.0 -> 9.12.4-P1, 9.14.0 -> 9.14.2. Also all releases of the BIND 9.13 development branch and version 9.15.0 of the BIND 9.15 development branch and BIND Supported Preview Edition versions 9.11.3-S1 -> 9.11.7-S1.
Credit: security-officer@isc.org
Affected Software | Affected Version | How to fix |
---|---|---|
Riverbed SteelApp Traffic Manager | >=11.5.2<=11.5.9 | |
Riverbed SteelApp Traffic Manager | >=11.6.1<=11.6.4 | |
Riverbed SteelApp Traffic Manager | >=12.1.0<=12.1.4 | |
Riverbed SteelApp Traffic Manager | >=13.1.0<=13.1.1 | |
Riverbed SteelApp Traffic Manager | =14.0.0 | |
Riverbed SteelApp Traffic Manager | =14.1.0 | |
Riverbed SteelApp Traffic Manager | =15.0.0 | |
F5 BIG-IP Application Acceleration Manager | >=11.5.2<=11.5.9 | |
F5 BIG-IP Application Acceleration Manager | >=11.6.1<=11.6.4 | |
F5 BIG-IP Application Acceleration Manager | >=12.1.0<=12.1.4 | |
F5 BIG-IP Application Acceleration Manager | >=13.1.0<=13.1.1 | |
F5 BIG-IP Application Acceleration Manager | =14.0.0 | |
F5 BIG-IP Application Acceleration Manager | =14.1.0 | |
F5 BIG-IP Application Acceleration Manager | =15.0.0 | |
F5 BIG-IP Advanced Firewall Manager | >=11.5.2<=11.5.9 | |
F5 BIG-IP Advanced Firewall Manager | >=11.6.1<=11.6.4 | |
F5 BIG-IP Advanced Firewall Manager | >=12.1.0<=12.1.4 | |
F5 BIG-IP Advanced Firewall Manager | >=13.1.0<=13.1.1 | |
F5 BIG-IP Advanced Firewall Manager | =14.0.0 | |
F5 BIG-IP Advanced Firewall Manager | =14.1.0 | |
F5 BIG-IP Advanced Firewall Manager | =15.0.0 | |
F5 BIG-IP Analytics | >=11.5.2<=11.5.9 | |
F5 BIG-IP Analytics | >=11.6.1<=11.6.4 | |
F5 BIG-IP Analytics | >=12.1.0<=12.1.4 | |
F5 BIG-IP Analytics | >=13.1.0<=13.1.1 | |
F5 BIG-IP Analytics | =14.0.0 | |
F5 BIG-IP Analytics | =14.1.0 | |
F5 BIG-IP Analytics | =15.0.0 | |
F5 Access Policy Manager | >=11.5.2<=11.5.9 | |
F5 Access Policy Manager | >=11.6.1<=11.6.4 | |
F5 Access Policy Manager | >=12.1.0<=12.1.4 | |
F5 Access Policy Manager | >=13.1.0<=13.1.1 | |
F5 Access Policy Manager | =14.0.0 | |
F5 Access Policy Manager | =14.1.0 | |
F5 Access Policy Manager | =15.0.0 | |
F5 Application Security Manager | >=11.5.2<=11.5.9 | |
F5 Application Security Manager | >=11.6.1<=11.6.4 | |
F5 Application Security Manager | >=12.1.0<=12.1.4 | |
F5 Application Security Manager | >=13.1.0<=13.1.1 | |
F5 Application Security Manager | =14.0.0 | |
F5 Application Security Manager | =14.1.0 | |
F5 Application Security Manager | =15.0.0 | |
F5 BIG-IP Edge Gateway | >=11.5.2<=11.5.9 | |
F5 BIG-IP Edge Gateway | >=11.6.1<=11.6.4 | |
F5 BIG-IP Edge Gateway | >=12.1.0<=12.1.4 | |
F5 BIG-IP Edge Gateway | >=13.1.0<=13.1.1 | |
F5 BIG-IP Edge Gateway | =14.0.0 | |
F5 BIG-IP Edge Gateway | =14.1.0 | |
F5 BIG-IP Edge Gateway | =15.0.0 | |
F5 BIG-IP Fraud Protection Service | >=11.5.2<=11.5.9 | |
F5 BIG-IP Fraud Protection Service | >=11.6.1<=11.6.4 | |
F5 BIG-IP Fraud Protection Service | >=12.1.0<=12.1.4 | |
F5 BIG-IP Fraud Protection Service | >=13.1.0<=13.1.1 | |
F5 BIG-IP Fraud Protection Service | =14.0.0 | |
F5 BIG-IP Fraud Protection Service | =14.1.0 | |
F5 BIG-IP Fraud Protection Service | =15.0.0 | |
Riverbed SteelApp Traffic Manager | >=11.5.2<=11.5.9 | |
Riverbed SteelApp Traffic Manager | >=11.6.1<=11.6.4 | |
Riverbed SteelApp Traffic Manager | >=12.1.0<=12.1.4 | |
Riverbed SteelApp Traffic Manager | >=13.1.0<=13.1.1 | |
Riverbed SteelApp Traffic Manager | =9.2.2 | |
Riverbed SteelApp Traffic Manager | =14.0.0 | |
Riverbed SteelApp Traffic Manager | =14.1.0 | |
Riverbed SteelApp Traffic Manager | =15.0.0 | |
F5 BIG-IP Link Controller | >=11.5.2<=11.5.9 | |
F5 BIG-IP Link Controller | >=11.6.1<=11.6.4 | |
F5 BIG-IP Link Controller | >=12.1.0<=12.1.4 | |
F5 BIG-IP Link Controller | >=13.1.0<=13.1.1 | |
F5 BIG-IP Link Controller | =9.2.2 | |
F5 BIG-IP Link Controller | =14.0.0 | |
F5 BIG-IP Link Controller | =14.1.0 | |
F5 BIG-IP Link Controller | =15.0.0 | |
F5 BIG-IP WebAccelerator | >=11.5.2<=11.5.9 | |
F5 BIG-IP WebAccelerator | >=11.6.1<=11.6.4 | |
F5 BIG-IP WebAccelerator | >=12.1.0<=12.1.4 | |
F5 BIG-IP WebAccelerator | >=13.1.0<=13.1.1 | |
F5 BIG-IP WebAccelerator | =9.2.2 | |
F5 BIG-IP WebAccelerator | =14.0.0 | |
F5 BIG-IP WebAccelerator | =14.1.0 | |
F5 BIG-IP WebAccelerator | =15.0.0 | |
F5 BIG-IP Policy Enforcement Manager | >=11.5.2<=11.5.9 | |
F5 BIG-IP Policy Enforcement Manager | >=11.6.1<=11.6.4 | |
F5 BIG-IP Policy Enforcement Manager | >=12.1.0<=12.1.4 | |
F5 BIG-IP Policy Enforcement Manager | >=13.1.0<=13.1.1 | |
F5 BIG-IP Policy Enforcement Manager | =9.2.2 | |
F5 BIG-IP Policy Enforcement Manager | =14.0.0 | |
F5 BIG-IP Policy Enforcement Manager | =14.1.0 | |
F5 BIG-IP Policy Enforcement Manager | =15.0.0 | |
ISC BIND 9 | >=9.11.0<=9.11.7 | |
ISC BIND 9 | >=9.12.0<=9.12.3 | |
ISC BIND 9 | >=9.13.0<=9.13.7 | |
ISC BIND 9 | >=9.14.0<=9.14.2 | |
ISC BIND 9 | >=9.15.0<=9.15.5 | |
ISC BIND 9 | =9.11.3-s1 | |
ISC BIND 9 | =9.11.7-s1 | |
ISC BIND 9 | =9.12.4 | |
ISC BIND 9 | =9.12.4-p1 | |
F5 Enterprise Manager | =3.1.1 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=5.1.0<=5.4.0 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=6.0.0<=6.1.0 | |
F5 iWorkflow | =2.3.0 | |
F5 BIG-IP | >=11.5.2<=11.5.9 | |
F5 BIG-IP | >=11.6.1<=11.6.4 | |
F5 BIG-IP | >=12.1.0<=12.1.4 | |
F5 BIG-IP | >=13.1.0<=13.1.1 | |
F5 BIG-IP | =9.2.2 | |
F5 BIG-IP | =14.0.0 | |
F5 BIG-IP | =14.1.0 | |
F5 BIG-IP | =15.0.0 |
Upgrade to the patched release most closely related to your current version of BIND: BIND 9.11.8 BIND 9.12.4-P2 BIND 9.14.3 BIND 9.15.1 BIND Supported Preview Edition is a special feature preview branch of BIND provided to eligible ISC support customers. BIND 9.11.8-S1
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-6471 is high due to the potential for denial of service caused by a race condition in BIND.
To fix CVE-2019-6471, upgrade to the latest version of BIND that is not affected, specifically versions beyond 9.11.7, 9.12.4-P1, or 9.14.2.
CVE-2019-6471 affects multiple versions of ISC BIND, as well as specific versions of F5 BIG-IP products.
There is no official workaround for CVE-2019-6471; the recommended action is to apply the appropriate software update.
If CVE-2019-6471 is exploited, it can result in BIND exiting unexpectedly, causing denial of service.