CVE-2017-3135

MEDIUM

Description

Under some conditions when using both DNS64 and RPZ to rewrite query responses, query processing can resume in an inconsistent state leading to either an INSIST assertion failure or an attempt to read through a NULL pointer. Affects BIND 9.8.8, 9.9.3-S1 -> 9.9.9-S7, 9.9.3 -> 9.9.9-P5, 9.9.10b1, 9.10.0 -> 9.10.4-P5, 9.10.5b1, 9.11.0 -> 9.11.0-P2, 9.11.1b1.

References

http://rhn.redhat.com/errata/RHSA-2017-0276.html

http://www.securityfocus.com/bid/96150

http://www.securitytracker.com/id/1037801

https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03747en_us

https://kb.isc.org/docs/aa-01453

https://security.gentoo.org/glsa/201708-01

https://security.netapp.com/advisory/ntap-20180926-0005/

https://www.debian.org/security/2017/dsa-3795

Details

Source: MITRE

Published: 2019-01-16

Updated: 2019-10-09

Type: CWE-476

Risk Information

CVSS v2.0

Base Score: 4.3

Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 8.6

Severity: MEDIUM

CVSS v3.0

Base Score: 5.9

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

Impact Score: 3.6

Exploitability Score: 2.2

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:isc:bind:9.9.3:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.3:s1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.8:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.9:p5:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.9:s7:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.9.10:beta1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.10.0:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.10.4:p1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.10.4:p2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.10.4:p3:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.10.4:p4:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.10.4:p5:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.10.5:beta1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.11.0:*:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.11.0:p1:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.11.0:p2:*:*:*:*:*:*

cpe:2.3:a:isc:bind:9.11.1:beta1:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

Configuration 3

OR

cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*

cpe:2.3:a:netapp:element_software_management_node:-:*:*:*:*:*:*:*

Configuration 4

OR

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Tenable Plugins

View all (24 total)

IDNameProductFamilySeverity
102531GLSA-201708-01 : BIND: Multiple vulnerabilitiesNessusGentoo Local Security Checks
high
102074Juniper Junos SRX, vSRX, and J-Series ISC BIND DoS (JSA10799)NessusJunos Local Security Checks
high
101423Virtuozzo 7 : bind / bind-chroot / bind-devel / bind-libs / etc (VZLSA-2017-0276)NessusVirtuozzo Local Security Checks
medium
99871EulerOS 2.0 SP2 : bind (EulerOS-SA-2017-1026)NessusHuawei Local Security Checks
medium
99870EulerOS 2.0 SP1 : bind (EulerOS-SA-2017-1025)NessusHuawei Local Security Checks
medium
97568openSUSE Security Update : bind (openSUSE-2017-314)NessusSuSE Local Security Checks
medium
97541Fedora 24 : bind99 (2017-d0c9bf9508)NessusFedora Local Security Checks
medium
97536Fedora 25 : bind99 (2017-96b7f4f53e)NessusFedora Local Security Checks
medium
97520SUSE SLED12 / SLES12 Security Update : bind (SUSE-SU-2017:0596-1)NessusSuSE Local Security Checks
medium
97519SUSE SLES11 Security Update : bind (SUSE-SU-2017:0595-1)NessusSuSE Local Security Checks
medium
97518SUSE SLES12 Security Update : bind (SUSE-SU-2017:0594-1)NessusSuSE Local Security Checks
medium
97440Debian DLA-843-1 : bind9 security updateNessusDebian Local Security Checks
medium
97399Debian DSA-3795-1 : bind9 - security updateNessusDebian Local Security Checks
medium
97333F5 Networks BIG-IP : BIND vulnerability (K80533167)NessusF5 Networks Local Security Checks
critical
97242Fedora 24 : 32:bind (2017-27099c270a)NessusFedora Local Security Checks
medium
9968ISC BIND 9.9.9 < 9.9.9-S8 / 9.9.9-P6 / 9.10.x < 9.10.4-P6 / 9.11.x < 9.11.0-P3 DoSNessus Network MonitorDNS Servers
high
97227ISC BIND 9 < 9.9.9-P6 / 9.9.9-S8 / 9.10.4-P6 / 9.11.0-P3 DNS64 and RPZ DoSNessusDNS
medium
97223Ubuntu 12.04 LTS / 14.04 LTS / 16.04 LTS / 16.10 : bind9 vulnerabilities (USN-3201-1)NessusUbuntu Local Security Checks
medium
97201Scientific Linux Security Update : bind on SL7.x x86_64 (20170215)NessusScientific Linux Local Security Checks
medium
97200RHEL 7 : bind (RHSA-2017:0276)NessusRed Hat Local Security Checks
medium
97198Oracle Linux 7 : bind (ELSA-2017-0276)NessusOracle Linux Local Security Checks
medium
97194CentOS 7 : bind (CESA-2017:0276)NessusCentOS Local Security Checks
medium
97162Fedora 25 : 32:bind (2017-2b46c8b6c2)NessusFedora Local Security Checks
medium
97101Slackware 13.0 / 13.1 / 13.37 / 14.0 / 14.1 / 14.2 / current : bind (SSA:2017-041-01)NessusSlackware Local Security Checks
medium