Логотип exploitDog
bind:CVE-2017-3143
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2017-3143

Количество 12

Количество 12

ubuntu логотип

CVE-2017-3143

почти 7 лет назад

An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name for the zone and service being targeted may be able to manipulate BIND into accepting an unauthorized dynamic update. Affects BIND 9.4.0->9.8.8, 9.9.0->9.9.10-P1, 9.10.0->9.10.5-P1, 9.11.0->9.11.1-P1, 9.9.3-S1->9.9.10-S2, 9.10.5-S1->9.10.5-S2.

CVSS3: 7.5
EPSS: Средний
redhat логотип

CVE-2017-3143

больше 8 лет назад

An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name for the zone and service being targeted may be able to manipulate BIND into accepting an unauthorized dynamic update. Affects BIND 9.4.0->9.8.8, 9.9.0->9.9.10-P1, 9.10.0->9.10.5-P1, 9.11.0->9.11.1-P1, 9.9.3-S1->9.9.10-S2, 9.10.5-S1->9.10.5-S2.

CVSS3: 7.5
EPSS: Средний
nvd логотип

CVE-2017-3143

почти 7 лет назад

An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name for the zone and service being targeted may be able to manipulate BIND into accepting an unauthorized dynamic update. Affects BIND 9.4.0->9.8.8, 9.9.0->9.9.10-P1, 9.10.0->9.10.5-P1, 9.11.0->9.11.1-P1, 9.9.3-S1->9.9.10-S2, 9.10.5-S1->9.10.5-S2.

CVSS3: 7.5
EPSS: Средний
debian логотип

CVE-2017-3143

почти 7 лет назад

An attacker who is able to send and receive messages to an authoritati ...

CVSS3: 7.5
EPSS: Средний
github логотип

GHSA-jxfm-jqx8-8h25

больше 3 лет назад

An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name for the zone and service being targeted may be able to manipulate BIND into accepting an unauthorized dynamic update. Affects BIND 9.4.0->9.8.8, 9.9.0->9.9.10-P1, 9.10.0->9.10.5-P1, 9.11.0->9.11.1-P1, 9.9.3-S1->9.9.10-S2, 9.10.5-S1->9.10.5-S2.

CVSS3: 5.9
EPSS: Средний
fstec логотип

BDU:2018-00105

больше 8 лет назад

Уязвимость реализации протокола TSIG DNS-сервера BIND, позволяющая нарушителю обойти процедуру аутентификации и получить корректную подпись для произвольных данных

CVSS3: 7.5
EPSS: Средний
suse-cvrf логотип

openSUSE-SU-2017:1809-1

больше 8 лет назад

Security update for bind

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2017:1738-1

больше 8 лет назад

Security update for bind

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2017:1737-1

больше 8 лет назад

Security update for bind

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2017:1736-1

больше 8 лет назад

Security update for bind

EPSS: Низкий
oracle-oval логотип

ELSA-2017-1680

больше 8 лет назад

ELSA-2017-1680: bind security and bug fix update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2017-1679

больше 8 лет назад

ELSA-2017-1679: bind security and bug fix update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2017-3143

An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name for the zone and service being targeted may be able to manipulate BIND into accepting an unauthorized dynamic update. Affects BIND 9.4.0->9.8.8, 9.9.0->9.9.10-P1, 9.10.0->9.10.5-P1, 9.11.0->9.11.1-P1, 9.9.3-S1->9.9.10-S2, 9.10.5-S1->9.10.5-S2.

CVSS3: 7.5
28%
Средний
почти 7 лет назад
redhat логотип
CVE-2017-3143

An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name for the zone and service being targeted may be able to manipulate BIND into accepting an unauthorized dynamic update. Affects BIND 9.4.0->9.8.8, 9.9.0->9.9.10-P1, 9.10.0->9.10.5-P1, 9.11.0->9.11.1-P1, 9.9.3-S1->9.9.10-S2, 9.10.5-S1->9.10.5-S2.

CVSS3: 7.5
28%
Средний
больше 8 лет назад
nvd логотип
CVE-2017-3143

An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name for the zone and service being targeted may be able to manipulate BIND into accepting an unauthorized dynamic update. Affects BIND 9.4.0->9.8.8, 9.9.0->9.9.10-P1, 9.10.0->9.10.5-P1, 9.11.0->9.11.1-P1, 9.9.3-S1->9.9.10-S2, 9.10.5-S1->9.10.5-S2.

CVSS3: 7.5
28%
Средний
почти 7 лет назад
debian логотип
CVE-2017-3143

An attacker who is able to send and receive messages to an authoritati ...

CVSS3: 7.5
28%
Средний
почти 7 лет назад
github логотип
GHSA-jxfm-jqx8-8h25

An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name for the zone and service being targeted may be able to manipulate BIND into accepting an unauthorized dynamic update. Affects BIND 9.4.0->9.8.8, 9.9.0->9.9.10-P1, 9.10.0->9.10.5-P1, 9.11.0->9.11.1-P1, 9.9.3-S1->9.9.10-S2, 9.10.5-S1->9.10.5-S2.

CVSS3: 5.9
28%
Средний
больше 3 лет назад
fstec логотип
BDU:2018-00105

Уязвимость реализации протокола TSIG DNS-сервера BIND, позволяющая нарушителю обойти процедуру аутентификации и получить корректную подпись для произвольных данных

CVSS3: 7.5
28%
Средний
больше 8 лет назад
suse-cvrf логотип
openSUSE-SU-2017:1809-1

Security update for bind

больше 8 лет назад
suse-cvrf логотип
SUSE-SU-2017:1738-1

Security update for bind

больше 8 лет назад
suse-cvrf логотип
SUSE-SU-2017:1737-1

Security update for bind

больше 8 лет назад
suse-cvrf логотип
SUSE-SU-2017:1736-1

Security update for bind

больше 8 лет назад
oracle-oval логотип
ELSA-2017-1680

ELSA-2017-1680: bind security and bug fix update (IMPORTANT)

больше 8 лет назад
oracle-oval логотип
ELSA-2017-1679

ELSA-2017-1679: bind security and bug fix update (IMPORTANT)

больше 8 лет назад

Уязвимостей на страницу