ALT-PU-2017-2118-1
Closed vulnerabilities
BDU:2018-00105
Уязвимость реализации протокола TSIG DNS-сервера BIND, позволяющая нарушителю обойти процедуру аутентификации и получить корректную подпись для произвольных данных
BDU:2020-00776
Уязвимость сервера DNS BIND, связанная с ошибками обработки данных, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2016-2775
ISC BIND 9.x before 9.9.9-P2, 9.10.x before 9.10.4-P2, and 9.11.x before 9.11.0b2, when lwresd or the named lwres option is enabled, allows remote attackers to cause a denial of service (daemon crash) via a long request that uses the lightweight resolver protocol.
- 92037
- 92037
- 1036360
- 1036360
- RHBA-2017:0651
- RHBA-2017:0651
- RHBA-2017:1767
- RHBA-2017:1767
- RHSA-2017:2533
- RHSA-2017:2533
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05321107
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05321107
- https://kb.isc.org/article/AA-01393/74/CVE-2016-2775
- https://kb.isc.org/article/AA-01393/74/CVE-2016-2775
- https://kb.isc.org/article/AA-01435
- https://kb.isc.org/article/AA-01435
- https://kb.isc.org/article/AA-01436
- https://kb.isc.org/article/AA-01436
- https://kb.isc.org/article/AA-01438
- https://kb.isc.org/article/AA-01438
- FEDORA-2016-007efacd1c
- FEDORA-2016-007efacd1c
- FEDORA-2016-2941b3264e
- FEDORA-2016-2941b3264e
- FEDORA-2016-53f0c65f40
- FEDORA-2016-53f0c65f40
- FEDORA-2016-3fba74e7f5
- FEDORA-2016-3fba74e7f5
- GLSA-201610-07
- GLSA-201610-07
- https://security.netapp.com/advisory/ntap-20160722-0002/
- https://security.netapp.com/advisory/ntap-20160722-0002/
Modified: 2024-11-21
CVE-2016-6170
ISC BIND through 9.9.9-P1, 9.10.x through 9.10.4-P1, and 9.11.x through 9.11.0b1 allows primary DNS servers to cause a denial of service (secondary DNS server crash) via a large AXFR response, and possibly allows IXFR servers to cause a denial of service (IXFR client crash) via a large IXFR response and allows remote authenticated users to cause a denial of service (primary DNS server crash) via a large UPDATE message.
- [oss-security] 20160706 Malicious primary DNS servers can crash secondaries
- [oss-security] 20160706 Malicious primary DNS servers can crash secondaries
- 91611
- 91611
- 1036241
- 1036241
- https://bugzilla.redhat.com/show_bug.cgi?id=1353563
- https://bugzilla.redhat.com/show_bug.cgi?id=1353563
- https://github.com/sischkg/xfer-limit/blob/master/README.md
- https://github.com/sischkg/xfer-limit/blob/master/README.md
- https://kb.isc.org/article/AA-01390
- https://kb.isc.org/article/AA-01390
- https://kb.isc.org/article/AA-01390/169/CVE-2016-6170
- https://kb.isc.org/article/AA-01390/169/CVE-2016-6170
- [dns-operations] 20160704 DNS activities in Japan
- [dns-operations] 20160704 DNS activities in Japan
- [dns-operations] 20160706 DNS activities in Japan
- [dns-operations] 20160706 DNS activities in Japan
- [dns-operations] 20160706 DNS activities in Japan
- [dns-operations] 20160706 DNS activities in Japan
- GLSA-201610-07
- GLSA-201610-07
Modified: 2024-11-21
CVE-2016-8864
named in ISC BIND 9.x before 9.9.9-P4, 9.10.x before 9.10.4-P4, and 9.11.x before 9.11.0-P1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a DNAME record in the answer section of a response to a recursive query, related to db.c and resolver.c.
- RHSA-2016:2141
- RHSA-2016:2141
- RHSA-2016:2142
- RHSA-2016:2142
- RHSA-2016:2615
- RHSA-2016:2615
- RHSA-2016:2871
- RHSA-2016:2871
- DSA-3703
- DSA-3703
- 94067
- 94067
- 1037156
- 1037156
- RHSA-2017:1583
- RHSA-2017:1583
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05381687
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05381687
- https://kb.isc.org/article/AA-01434
- https://kb.isc.org/article/AA-01434
- https://kb.isc.org/article/AA-01435
- https://kb.isc.org/article/AA-01435
- https://kb.isc.org/article/AA-01436
- https://kb.isc.org/article/AA-01436
- https://kb.isc.org/article/AA-01437
- https://kb.isc.org/article/AA-01437
- https://kb.isc.org/article/AA-01438
- https://kb.isc.org/article/AA-01438
- FreeBSD-SA-16:34
- FreeBSD-SA-16:34
- GLSA-201701-26
- GLSA-201701-26
- https://security.netapp.com/advisory/ntap-20180926-0005/
- https://security.netapp.com/advisory/ntap-20180926-0005/
Modified: 2024-11-21
CVE-2017-3135
Under some conditions when using both DNS64 and RPZ to rewrite query responses, query processing can resume in an inconsistent state leading to either an INSIST assertion failure or an attempt to read through a NULL pointer. Affects BIND 9.8.8, 9.9.3-S1 -> 9.9.9-S7, 9.9.3 -> 9.9.9-P5, 9.9.10b1, 9.10.0 -> 9.10.4-P5, 9.10.5b1, 9.11.0 -> 9.11.0-P2, 9.11.1b1.
- RHSA-2017:0276
- RHSA-2017:0276
- 96150
- 96150
- 1037801
- 1037801
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03747en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03747en_us
- https://kb.isc.org/docs/aa-01453
- https://kb.isc.org/docs/aa-01453
- GLSA-201708-01
- GLSA-201708-01
- https://security.netapp.com/advisory/ntap-20180926-0005/
- https://security.netapp.com/advisory/ntap-20180926-0005/
- DSA-3795
- DSA-3795
Modified: 2024-11-21
CVE-2017-3136
A query with a specific set of characteristics could cause a server using DNS64 to encounter an assertion failure and terminate. An attacker could deliberately construct a query, enabling denial-of-service against a server if it was configured to use the DNS64 feature and other preconditions were met. Affects BIND 9.8.0 -> 9.8.8-P1, 9.9.0 -> 9.9.9-P6, 9.9.10b1->9.9.10rc1, 9.10.0 -> 9.10.4-P6, 9.10.5b1->9.10.5rc1, 9.11.0 -> 9.11.0-P3, 9.11.1b1->9.11.1rc1, 9.9.3-S1 -> 9.9.9-S8.
- openSUSE-SU-2020:1699
- openSUSE-SU-2020:1699
- openSUSE-SU-2020:1701
- openSUSE-SU-2020:1701
- 97653
- 97653
- 1038259
- 1038259
- RHSA-2017:1095
- RHSA-2017:1095
- RHSA-2017:1105
- RHSA-2017:1105
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03747en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03747en_us
- https://kb.isc.org/docs/aa-01465
- https://kb.isc.org/docs/aa-01465
- GLSA-201708-01
- GLSA-201708-01
- https://security.netapp.com/advisory/ntap-20180802-0002/
- https://security.netapp.com/advisory/ntap-20180802-0002/
- DSA-3854
- DSA-3854
Modified: 2024-11-21
CVE-2017-3137
Mistaken assumptions about the ordering of records in the answer section of a response containing CNAME or DNAME resource records could lead to a situation in which named would exit with an assertion failure when processing a response in which records occurred in an unusual order. Affects BIND 9.9.9-P6, 9.9.10b1->9.9.10rc1, 9.10.4-P6, 9.10.5b1->9.10.5rc1, 9.11.0-P3, 9.11.1b1->9.11.1rc1, and 9.9.9-S8.
- 97651
- 97651
- 1038258
- 1038258
- 1040195
- 1040195
- RHSA-2017:1095
- RHSA-2017:1095
- RHSA-2017:1105
- RHSA-2017:1105
- RHSA-2017:1582
- RHSA-2017:1582
- RHSA-2017:1583
- RHSA-2017:1583
- https://kb.isc.org/docs/aa-01466
- https://kb.isc.org/docs/aa-01466
- GLSA-201708-01
- GLSA-201708-01
- https://security.netapp.com/advisory/ntap-20180802-0002/
- https://security.netapp.com/advisory/ntap-20180802-0002/
- DSA-3854
- DSA-3854
Modified: 2024-11-21
CVE-2017-3138
named contains a feature which allows operators to issue commands to a running server by communicating with the server process over a control channel, using a utility program such as rndc. A regression introduced in a recent feature change has created a situation under which some versions of named can be caused to exit with a REQUIRE assertion failure if they are sent a null command string. Affects BIND 9.9.9->9.9.9-P7, 9.9.10b1->9.9.10rc2, 9.10.4->9.10.4-P7, 9.10.5b1->9.10.5rc2, 9.11.0->9.11.0-P4, 9.11.1b1->9.11.1rc2, 9.9.9-S1->9.9.9-S9.
Modified: 2024-11-21
CVE-2017-3140
If named is configured to use Response Policy Zones (RPZ) an error processing some rule types can lead to a condition where BIND will endlessly loop while handling a query. Affects BIND 9.9.10, 9.10.5, 9.11.0->9.11.1, 9.9.10-S1, 9.10.5-S1.
- 99088
- 99088
- 1038692
- 1038692
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03772en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03772en_us
- https://kb.isc.org/docs/aa-01495
- https://kb.isc.org/docs/aa-01495
- GLSA-201708-01
- GLSA-201708-01
- https://security.netapp.com/advisory/ntap-20180926-0001/
- https://security.netapp.com/advisory/ntap-20180926-0001/
Modified: 2024-11-21
CVE-2017-3141
The BIND installer on Windows uses an unquoted service path which can enable a local user to achieve privilege escalation if the host file system permissions allow this. Affects BIND 9.2.6-P2->9.2.9, 9.3.2-P1->9.3.6, 9.4.0->9.8.8, 9.9.0->9.9.10, 9.10.0->9.10.5, 9.11.0->9.11.1, 9.9.3-S1->9.9.10-S1, 9.10.5-S1.
Modified: 2024-11-21
CVE-2017-3142
An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name may be able to circumvent TSIG authentication of AXFR requests via a carefully constructed request packet. A server that relies solely on TSIG keys for protection with no other ACL protection could be manipulated into: providing an AXFR of a zone to an unauthorized recipient or accepting bogus NOTIFY packets. Affects BIND 9.4.0->9.8.8, 9.9.0->9.9.10-P1, 9.10.0->9.10.5-P1, 9.11.0->9.11.1-P1, 9.9.3-S1->9.9.10-S2, 9.10.5-S1->9.10.5-S2.
- 99339
- 99339
- 1038809
- 1038809
- RHSA-2017:1679
- RHSA-2017:1679
- RHSA-2017:1680
- RHSA-2017:1680
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03772en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03772en_us
- https://kb.isc.org/docs/aa-01504
- https://kb.isc.org/docs/aa-01504
- https://security.netapp.com/advisory/ntap-20190830-0003/
- https://security.netapp.com/advisory/ntap-20190830-0003/
- DSA-3904
- DSA-3904
Modified: 2024-11-21
CVE-2017-3143
An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name for the zone and service being targeted may be able to manipulate BIND into accepting an unauthorized dynamic update. Affects BIND 9.4.0->9.8.8, 9.9.0->9.9.10-P1, 9.10.0->9.10.5-P1, 9.11.0->9.11.1-P1, 9.9.3-S1->9.9.10-S2, 9.10.5-S1->9.10.5-S2.
- 99337
- 99337
- 1038809
- 1038809
- RHSA-2017:1679
- RHSA-2017:1679
- RHSA-2017:1680
- RHSA-2017:1680
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03772en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03772en_us
- https://kb.isc.org/docs/aa-01503
- https://kb.isc.org/docs/aa-01503
- https://security.netapp.com/advisory/ntap-20190830-0003/
- https://security.netapp.com/advisory/ntap-20190830-0003/
- DSA-3904
- DSA-3904
Closed bugs
control bind-chroot не работает в случае использования systemd