First published: Wed Jan 16 2019(Updated: )
The BIND installer on Windows uses an unquoted service path which can enable a local user to achieve privilege escalation if the host file system permissions allow this. Affects BIND 9.2.6-P2->9.2.9, 9.3.2-P1->9.3.6, 9.4.0->9.8.8, 9.9.0->9.9.10, 9.10.0->9.10.5, 9.11.0->9.11.1, 9.9.3-S1->9.9.10-S1, 9.10.5-S1.
Credit: security-officer@isc.org
Affected Software | Affected Version | How to fix |
---|---|---|
BIND 9 | >=9.2.6<=9.2.9 | |
BIND 9 | >=9.3.2<=9.3.6 | |
BIND 9 | >=9.4.0<=9.8.8 | |
BIND 9 | >=9.9.0<=9.9.10 | |
BIND 9 | >=9.10.0<=9.10.5 | |
BIND 9 | >=9.11.0<=9.11.1 | |
BIND 9 | =9.2.6-p2 | |
BIND 9 | =9.3.2-p1 |
Upgrade to the patched release most closely related to your current version of BIND. These can all be downloaded from http://www.isc.org/downloads. BIND 9 version 9.9.10-P1 BIND 9 version 9.10.5-P1 BIND 9 version 9.11.1-P1 BIND Supported Preview Edition is a special feature preview branch of BIND provided to eligible ISC support customers. BIND 9 version 9.9.10-S2 BIND 9 version 9.10.5-S2
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-3141 is a vulnerability in the BIND installer on Windows that uses an unquoted service path, enabling a local user to achieve privilege escalation.
BIND versions 9.2.6-P2 to 9.2.9, 9.3.2-P1 to 9.3.6, 9.4.0 to 9.8.8, 9.9.0 to 9.9.10, 9.10.0 to 9.10.5, and 9.11.0 to 9.11.1 are affected by CVE-2017-3141.
The severity of CVE-2017-3141 is high, with a CVSS score of 7.8.
This vulnerability can be exploited by a local user with appropriate file system permissions to escalate their privileges on the system.
You can find more information about CVE-2017-3141 at the following references: [SecurityFocus](http://www.securityfocus.com/bid/99089), [SecurityTracker](http://www.securitytracker.com/id/1038693), and [ISC Knowledge Base](https://kb.isc.org/docs/aa-01496).