CVE-2017-3143
16.01.2019, 20:29
An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name for the zone and service being targeted may be able to manipulate BIND into accepting an unauthorized dynamic update. Affects BIND 9.4.0->9.8.8, 9.9.0->9.9.10-P1, 9.10.0->9.10.5-P1, 9.11.0->9.11.1-P1, 9.9.3-S1->9.9.10-S2, 9.10.5-S1->9.10.5-S2.Enginsight
Vendor | Product | Version |
---|---|---|
isc | bind | 9.4.0 ≤ 𝑥 ≤ 9.8.8 |
isc | bind | 9.9.0 ≤ 𝑥 ≤ 9.9.10 |
isc | bind | 9.10.0 ≤ 𝑥 ≤ 9.10.5 |
isc | bind | 9.11.0 ≤ 𝑥 ≤ 9.11.1 |
isc | bind | 9.9.0:p1 |
isc | bind | 9.9.3:s1 |
isc | bind | 9.9.10:s2 |
isc | bind | 9.10.5:p1 |
isc | bind | 9.10.5:s1 |
isc | bind | 9.10.5:s2 |
isc | bind | 9.11.1:p1 |
redhat | enterprise_linux_desktop | 6.0 |
redhat | enterprise_linux_desktop | 7.0 |
redhat | enterprise_linux_server | 6.0 |
redhat | enterprise_linux_server | 7.0 |
redhat | enterprise_linux_server_aus | 7.3 |
redhat | enterprise_linux_server_aus | 7.4 |
redhat | enterprise_linux_server_aus | 7.6 |
redhat | enterprise_linux_server_eus | 7.3 |
redhat | enterprise_linux_server_eus | 7.4 |
redhat | enterprise_linux_server_eus | 7.5 |
redhat | enterprise_linux_server_eus | 7.6 |
redhat | enterprise_linux_server_tus | 7.3 |
redhat | enterprise_linux_server_tus | 7.6 |
redhat | enterprise_linux_workstation | 6.0 |
redhat | enterprise_linux_workstation | 7.0 |
debian | debian_linux | 8.0 |
debian | debian_linux | 9.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
References