CVE-2017-3142
16.01.2019, 20:29
An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name may be able to circumvent TSIG authentication of AXFR requests via a carefully constructed request packet. A server that relies solely on TSIG keys for protection with no other ACL protection could be manipulated into: providing an AXFR of a zone to an unauthorized recipient or accepting bogus NOTIFY packets. Affects BIND 9.4.0->9.8.8, 9.9.0->9.9.10-P1, 9.10.0->9.10.5-P1, 9.11.0->9.11.1-P1, 9.9.3-S1->9.9.10-S2, 9.10.5-S1->9.10.5-S2.Enginsight
Vendor | Product | Version |
---|---|---|
isc | bind | 9.4.0 ≤ 𝑥 ≤ 9.8.8 |
isc | bind | 9.9.0 ≤ 𝑥 ≤ 9.9.10 |
isc | bind | 9.10.0 ≤ 𝑥 ≤ 9.10.5 |
isc | bind | 9.11.0 ≤ 𝑥 ≤ 9.11.1 |
isc | bind | 9.9.0:p1 |
isc | bind | 9.9.3:s1 |
isc | bind | 9.9.10:s2 |
isc | bind | 9.10.5:p1 |
isc | bind | 9.10.5:s1 |
isc | bind | 9.10.5:s2 |
isc | bind | 9.11.1:p1 |
redhat | enterprise_linux_desktop | 6.0 |
redhat | enterprise_linux_desktop | 7.0 |
redhat | enterprise_linux_server | 6.0 |
redhat | enterprise_linux_server | 7.0 |
redhat | enterprise_linux_server_aus | 7.3 |
redhat | enterprise_linux_server_aus | 7.4 |
redhat | enterprise_linux_server_aus | 7.6 |
redhat | enterprise_linux_server_eus | 7.3 |
redhat | enterprise_linux_server_eus | 7.4 |
redhat | enterprise_linux_server_eus | 7.5 |
redhat | enterprise_linux_server_eus | 7.6 |
redhat | enterprise_linux_server_tus | 7.3 |
redhat | enterprise_linux_server_tus | 7.6 |
redhat | enterprise_linux_workstation | 6.0 |
redhat | enterprise_linux_workstation | 7.0 |
debian | debian_linux | 8.0 |
debian | debian_linux | 9.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References