Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-3139

Опубликовано: 08 мая 2017
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

A denial of service flaw was found in the way BIND handled DNSSEC validation. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response.

Отчет

This issue affected only the BIND versions as shipped with Red Hat Enterprise Linux 6. This issue did not affect any upstream versions of BIND. This issue does not affect BIND configurations which have DNSSEC validation turned off.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5bindWill not fix
Red Hat Enterprise Linux 5bind97Will not fix
Red Hat Enterprise Linux 7bindNot affected
Red Hat Enterprise Linux 6bindFixedRHSA-2017:120208.05.2017
Red Hat Enterprise Linux 6.2 Advanced Update SupportbindFixedRHSA-2017:158228.06.2017
Red Hat Enterprise Linux 6.4 Advanced Update SupportbindFixedRHSA-2017:158228.06.2017
Red Hat Enterprise Linux 6.5 Advanced Update SupportbindFixedRHSA-2017:158228.06.2017
Red Hat Enterprise Linux 6.5 Telco Extended Update SupportbindFixedRHSA-2017:158228.06.2017
Red Hat Enterprise Linux 6.6 Advanced Update SupportbindFixedRHSA-2017:158228.06.2017
Red Hat Enterprise Linux 6.6 Telco Extended Update SupportbindFixedRHSA-2017:158228.06.2017

Показывать по

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=1447743bind: assertion failure in DNSSEC validation

EPSS

Процентиль: 72%
0.00723
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 7 лет назад

A denial of service flaw was found in the way BIND handled DNSSEC validation. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response.

CVSS3: 7.5
nvd
почти 7 лет назад

A denial of service flaw was found in the way BIND handled DNSSEC validation. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response.

CVSS3: 7.5
debian
почти 7 лет назад

A denial of service flaw was found in the way BIND handled DNSSEC vali ...

CVSS3: 7.5
github
больше 3 лет назад

A denial of service flaw was found in the way BIND handled DNSSEC validation. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response.

oracle-oval
больше 8 лет назад

ELSA-2017-1202: bind security update (IMPORTANT)

EPSS

Процентиль: 72%
0.00723
Низкий

7.5 High

CVSS3