CVE-2017-3142
16.01.2019, 20:29
An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name may be able to circumvent TSIG authentication of AXFR requests via a carefully constructed request packet. A server that relies solely on TSIG keys for protection with no other ACL protection could be manipulated into: providing an AXFR of a zone to an unauthorized recipient or accepting bogus NOTIFY packets. Affects BIND 9.4.0->9.8.8, 9.9.0->9.9.10-P1, 9.10.0->9.10.5-P1, 9.11.0->9.11.1-P1, 9.9.3-S1->9.9.10-S2, 9.10.5-S1->9.10.5-S2.Enginsight
| Vendor | Product | Version |
|---|---|---|
| isc | bind | 9.4.0 ≤ 𝑥 ≤ 9.8.8 |
| isc | bind | 9.9.0 ≤ 𝑥 ≤ 9.9.10 |
| isc | bind | 9.10.0 ≤ 𝑥 ≤ 9.10.5 |
| isc | bind | 9.11.0 ≤ 𝑥 ≤ 9.11.1 |
| isc | bind | 9.9.0:p1 |
| isc | bind | 9.9.3:s1 |
| isc | bind | 9.9.10:s2 |
| isc | bind | 9.10.5:p1 |
| isc | bind | 9.10.5:s1 |
| isc | bind | 9.10.5:s2 |
| isc | bind | 9.11.1:p1 |
| redhat | enterprise_linux_desktop | 6.0 |
| redhat | enterprise_linux_desktop | 7.0 |
| redhat | enterprise_linux_server | 6.0 |
| redhat | enterprise_linux_server | 7.0 |
| redhat | enterprise_linux_server_aus | 7.3 |
| redhat | enterprise_linux_server_aus | 7.4 |
| redhat | enterprise_linux_server_aus | 7.6 |
| redhat | enterprise_linux_server_eus | 7.3 |
| redhat | enterprise_linux_server_eus | 7.4 |
| redhat | enterprise_linux_server_eus | 7.5 |
| redhat | enterprise_linux_server_eus | 7.6 |
| redhat | enterprise_linux_server_tus | 7.3 |
| redhat | enterprise_linux_server_tus | 7.6 |
| redhat | enterprise_linux_workstation | 6.0 |
| redhat | enterprise_linux_workstation | 7.0 |
| debian | debian_linux | 8.0 |
| debian | debian_linux | 9.0 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Common Weakness Enumeration
References