First published: Wed Feb 08 2017(Updated: )
Under some conditions when using both DNS64 and RPZ to rewrite query responses, query processing can resume in an inconsistent state leading to either an INSIST assertion failure or an attempt to read through a NULL pointer. Affects BIND 9.8.8, 9.9.3-S1 -> 9.9.9-S7, 9.9.3 -> 9.9.9-P5, 9.9.10b1, 9.10.0 -> 9.10.4-P5, 9.10.5b1, 9.11.0 -> 9.11.0-P2, 9.11.1b1.
Credit: security-officer@isc.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/bind9 | 1:9.11.5.P4+dfsg-5.1+deb10u7 1:9.11.5.P4+dfsg-5.1+deb10u9 1:9.16.44-1~deb11u1 1:9.18.19-1~deb12u1 1:9.19.17-1 | |
ISC BIND 9 | =9.9.3 | |
ISC BIND 9 | =9.9.3-s1 | |
ISC BIND 9 | =9.9.8 | |
ISC BIND 9 | =9.9.9-p5 | |
ISC BIND 9 | =9.9.9-s7 | |
ISC BIND 9 | =9.9.10-beta1 | |
ISC BIND 9 | =9.10.0 | |
ISC BIND 9 | =9.10.4-p1 | |
ISC BIND 9 | =9.10.4-p2 | |
ISC BIND 9 | =9.10.4-p3 | |
ISC BIND 9 | =9.10.4-p4 | |
ISC BIND 9 | =9.10.4-p5 | |
ISC BIND 9 | =9.10.5-beta1 | |
ISC BIND 9 | =9.11.0 | |
ISC BIND 9 | =9.11.0-p1 | |
ISC BIND 9 | =9.11.0-p2 | |
ISC BIND 9 | =9.11.1-beta1 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =7.3 | |
Red Hat Enterprise Linux Server | =7.4 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Server | =7.3 | |
Red Hat Enterprise Linux Server | =7.4 | |
Red Hat Enterprise Linux Server | =7.5 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Server | =7.3 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Workstation | =7.0 | |
NetApp Data ONTAP | ||
NetApp Element Software | ||
Debian Linux | =8.0 | |
Debian Linux | =9.0 |
Upgrade to the patched release most closely related to your current version of BIND. These can all be downloaded from http://www.isc.org/downloads. BIND 9 version 9.9.9-P6 BIND 9 version 9.10.4-P6 BIND 9 version 9.11.0-P3 BIND Supported Preview Edition is a special feature preview branch of BIND provided to eligible ISC support customers. BIND 9 version 9.9.9-S8
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-3135 has been classified with high severity due to potential assertion failures and NULL pointer dereferencing.
To address CVE-2017-3135, upgrade to a patched version of BIND, such as 1:9.11.5.P4+dfsg-5.1+deb10u7 or later.
CVE-2017-3135 affects BIND versions 9.9.3-S1 through 9.9.9-S7, among others.
Yes, CVE-2017-3135 can cause service interruptions due to assertion failures and inconsistent query processing.
There are no official workarounds for CVE-2017-3135; upgrading to a secure version is recommended for mitigation.