Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-3145

Опубликовано: 16 янв. 2018
Источник: redhat
CVSS3: 7.5
EPSS Средний

Описание

BIND was improperly sequencing cleanup operations on upstream recursion fetch contexts, leading in some cases to a use-after-free error that can trigger an assertion failure and crash in named. Affects BIND 9.0.0 to 9.8.x, 9.9.0 to 9.9.11, 9.10.0 to 9.10.6, 9.11.0 to 9.11.2, 9.9.3-S1 to 9.9.11-S1, 9.10.5-S1 to 9.10.6-S1, 9.12.0a1 to 9.12.0rc1.

A use-after-free flaw leading to denial of service was found in the way BIND internally handled cleanup operations on upstream recursion fetch contexts. A remote attacker could potentially use this flaw to make named, acting as a DNSSEC validating resolver, exit unexpectedly with an assertion failure via a specially crafted DNS request.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5bindWill not fix
Red Hat Enterprise Linux 8bindNot affected
Red Hat Enterprise Linux 6bindFixedRHSA-2018:010122.01.2018
Red Hat Enterprise Linux 6.4 Advanced Update SupportbindFixedRHSA-2018:048712.03.2018
Red Hat Enterprise Linux 6.5 Advanced Update SupportbindFixedRHSA-2018:048712.03.2018
Red Hat Enterprise Linux 6.6 Advanced Update SupportbindFixedRHSA-2018:048712.03.2018
Red Hat Enterprise Linux 6.6 Telco Extended Update SupportbindFixedRHSA-2018:048712.03.2018
Red Hat Enterprise Linux 6.7 Extended Update SupportbindFixedRHSA-2018:048712.03.2018
Red Hat Enterprise Linux 7bindFixedRHSA-2018:010222.01.2018
Red Hat Enterprise Linux 7.2 Advanced Update SupportbindFixedRHSA-2018:048812.03.2018

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-416
https://bugzilla.redhat.com/show_bug.cgi?id=1534812bind: Improper fetch cleanup sequencing in the resolver can cause named to crash

EPSS

Процентиль: 93%
0.10126
Средний

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 7 лет назад

BIND was improperly sequencing cleanup operations on upstream recursion fetch contexts, leading in some cases to a use-after-free error that can trigger an assertion failure and crash in named. Affects BIND 9.0.0 to 9.8.x, 9.9.0 to 9.9.11, 9.10.0 to 9.10.6, 9.11.0 to 9.11.2, 9.9.3-S1 to 9.9.11-S1, 9.10.5-S1 to 9.10.6-S1, 9.12.0a1 to 9.12.0rc1.

CVSS3: 7.5
nvd
почти 7 лет назад

BIND was improperly sequencing cleanup operations on upstream recursion fetch contexts, leading in some cases to a use-after-free error that can trigger an assertion failure and crash in named. Affects BIND 9.0.0 to 9.8.x, 9.9.0 to 9.9.11, 9.10.0 to 9.10.6, 9.11.0 to 9.11.2, 9.9.3-S1 to 9.9.11-S1, 9.10.5-S1 to 9.10.6-S1, 9.12.0a1 to 9.12.0rc1.

CVSS3: 7.5
debian
почти 7 лет назад

BIND was improperly sequencing cleanup operations on upstream recursio ...

suse-cvrf
почти 8 лет назад

Security update for bind

suse-cvrf
почти 8 лет назад

Security update for bind

EPSS

Процентиль: 93%
0.10126
Средний

7.5 High

CVSS3