First published: Sun Mar 12 2017(Updated: )
Mistaken assumptions about the ordering of records in the answer section of a response containing CNAME or DNAME resource records could lead to a situation in which named would exit with an assertion failure when processing a response in which records occurred in an unusual order. A server which is performing recursion can be forced to exit with an assertion failure if it can be caused to receive a response containing CNAME or DNAME resource records with certain ordering. An attacker can cause a denial of service by exploiting this condition. Recursive resolvers are at highest risk but authoritative servers are theoretically vulnerable if they perform recursion. External References: <a href="https://kb.isc.org/article/AA-01466">https://kb.isc.org/article/AA-01466</a>
Credit: security-officer@isc.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/bind9 | 1:9.11.5.P4+dfsg-5.1+deb10u7 1:9.11.5.P4+dfsg-5.1+deb10u9 1:9.16.44-1~deb11u1 1:9.18.19-1~deb12u1 1:9.19.17-1 | |
debian/1:9.8.4.dfsg.P1-6+nmu2+deb7u18 | <=undefined | |
debian/bind9 | <=1:9.9.5.dfsg-9+deb8u10<=1:9.9.5.dfsg-9 | 1:9.10.3.dfsg.P4-12.3 1:9.10.6+dfsg-1 1:9.9.5.dfsg-9+deb8u11 |
redhat/bind | <9.9.9 | 9.9.9 |
redhat/bind | <9.10.4 | 9.10.4 |
redhat/bind | <9.11.0 | 9.11.0 |
BIND 9 | =9.9.9-p6 | |
BIND 9 | =9.9.9-s8 | |
BIND 9 | =9.9.10-beta1 | |
BIND 9 | =9.9.10-rc1 | |
BIND 9 | =9.10.4-p6 | |
BIND 9 | =9.10.5-b1 | |
BIND 9 | =9.10.5-rc1 | |
BIND 9 | =9.11.0-p3 | |
BIND 9 | =9.11.1-b1 | |
BIND 9 | =9.11.1-rc1 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =6.2 | |
redhat enterprise Linux server aus | =6.4 | |
redhat enterprise Linux server aus | =6.5 | |
redhat enterprise Linux server aus | =6.6 | |
redhat enterprise Linux server aus | =7.2 | |
redhat enterprise Linux server aus | =7.3 | |
redhat enterprise Linux server aus | =7.4 | |
redhat enterprise Linux server aus | =7.6 | |
redhat enterprise Linux server eus | =6.7 | |
redhat enterprise Linux server eus | =7.2 | |
redhat enterprise Linux server eus | =7.3 | |
redhat enterprise Linux server eus | =7.4 | |
redhat enterprise Linux server eus | =7.5 | |
redhat enterprise Linux server eus | =7.6 | |
redhat enterprise Linux server tus | =6.5 | |
redhat enterprise Linux server tus | =6.6 | |
redhat enterprise Linux server tus | =7.2 | |
redhat enterprise Linux server tus | =7.3 | |
redhat enterprise Linux server tus | =7.6 | |
redhat enterprise Linux workstation | =6.0 | |
redhat enterprise Linux workstation | =7.0 | |
NetApp Data ONTAP Edge | ||
NetApp Element Software | ||
NetApp OnCommand Balance | ||
Debian GNU/Linux | =8.0 |
Upgrade to the patched release most closely related to your current version of BIND. These can all be downloaded from http://www.isc.org/downloads. BIND 9 version 9.9.9-P8 BIND 9 version 9.10.4-P8 BIND 9 version 9.11.0-P5 BIND Supported Preview Edition is a special feature preview branch of BIND provided to eligible ISC support customers. BIND 9 version 9.9.9-S10 New maintenance releases of BIND are also scheduled which contain the fix for this vulnerability. In addition to the security releases listed above, fixes for this vulnerability are also included in these release candidate versions: BIND 9 version 9.9.10rc3 BIND 9 version 9.10.5rc3 BIND 9 version 9.11.1rc3
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-3137 is classified as a high-severity vulnerability due to its potential to cause assertion failures leading to denial-of-service.
To fix CVE-2017-3137, upgrade to a patched version of BIND specified in the remediation section, such as 9.11.5.P4+dfsg-5.1+deb10u7 or later.
CVE-2017-3137 affects various versions of the BIND DNS server, particularly those below the patched versions mentioned in the remediation section.
The impact of CVE-2017-3137 is that it may cause your server to crash or become unresponsive due to assertion failures when processing DNS responses.
There is no known workaround for CVE-2017-3137, so upgrading to a secure version is the recommended action.