Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2017-3142

Опубликовано: 16 янв. 2019
Источник: ubuntu
Приоритет: medium
CVSS2: 4.3
CVSS3: 5.3

Описание

An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name may be able to circumvent TSIG authentication of AXFR requests via a carefully constructed request packet. A server that relies solely on TSIG keys for protection with no other ACL protection could be manipulated into: providing an AXFR of a zone to an unauthorized recipient or accepting bogus NOTIFY packets. Affects BIND 9.4.0->9.8.8, 9.9.0->9.9.10-P1, 9.10.0->9.10.5-P1, 9.11.0->9.11.1-P1, 9.9.3-S1->9.9.10-S2, 9.10.5-S1->9.10.5-S2.

РелизСтатусПримечание
artful

released

1:9.10.3.dfsg.P4-10.1ubuntu7
devel

released

1:9.10.3.dfsg.P4-10.1ubuntu7
esm-infra-legacy/trusty

released

1:9.9.5.dfsg-3ubuntu0.15
esm-infra/xenial

released

1:9.10.3.dfsg.P4-8ubuntu1.7
precise/esm

not-affected

1:9.8.1.dfsg.P1-4ubuntu0.23
trusty

released

1:9.9.5.dfsg-3ubuntu0.15
trusty/esm

released

1:9.9.5.dfsg-3ubuntu0.15
upstream

needs-triage

vivid/ubuntu-core

ignored

end of life
xenial

released

1:9.10.3.dfsg.P4-8ubuntu1.7

Показывать по

4.3 Medium

CVSS2

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
redhat
больше 8 лет назад

An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name may be able to circumvent TSIG authentication of AXFR requests via a carefully constructed request packet. A server that relies solely on TSIG keys for protection with no other ACL protection could be manipulated into: providing an AXFR of a zone to an unauthorized recipient or accepting bogus NOTIFY packets. Affects BIND 9.4.0->9.8.8, 9.9.0->9.9.10-P1, 9.10.0->9.10.5-P1, 9.11.0->9.11.1-P1, 9.9.3-S1->9.9.10-S2, 9.10.5-S1->9.10.5-S2.

CVSS3: 5.3
nvd
почти 7 лет назад

An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name may be able to circumvent TSIG authentication of AXFR requests via a carefully constructed request packet. A server that relies solely on TSIG keys for protection with no other ACL protection could be manipulated into: providing an AXFR of a zone to an unauthorized recipient or accepting bogus NOTIFY packets. Affects BIND 9.4.0->9.8.8, 9.9.0->9.9.10-P1, 9.10.0->9.10.5-P1, 9.11.0->9.11.1-P1, 9.9.3-S1->9.9.10-S2, 9.10.5-S1->9.10.5-S2.

CVSS3: 5.3
debian
почти 7 лет назад

An attacker who is able to send and receive messages to an authoritati ...

CVSS3: 3.7
github
больше 3 лет назад

An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name may be able to circumvent TSIG authentication of AXFR requests via a carefully constructed request packet. A server that relies solely on TSIG keys for protection with no other ACL protection could be manipulated into: providing an AXFR of a zone to an unauthorized recipient or accepting bogus NOTIFY packets. Affects BIND 9.4.0->9.8.8, 9.9.0->9.9.10-P1, 9.10.0->9.10.5-P1, 9.11.0->9.11.1-P1, 9.9.3-S1->9.9.10-S2, 9.10.5-S1->9.10.5-S2.

suse-cvrf
больше 8 лет назад

Security update for bind

4.3 Medium

CVSS2

5.3 Medium

CVSS3