First published: Tue Jan 16 2018(Updated: )
BIND was improperly sequencing cleanup operations on upstream recursion fetch contexts, leading in some cases to a use-after-free error that can trigger an assertion failure and crash in named. Affects BIND 9.0.0 to 9.8.x, 9.9.0 to 9.9.11, 9.10.0 to 9.10.6, 9.11.0 to 9.11.2, 9.9.3-S1 to 9.9.11-S1, 9.10.5-S1 to 9.10.6-S1, 9.12.0a1 to 9.12.0rc1.
Credit: security-officer@isc.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/bind9 | 1:9.11.5.P4+dfsg-5.1+deb10u7 1:9.11.5.P4+dfsg-5.1+deb10u9 1:9.16.44-1~deb11u1 1:9.18.19-1~deb12u1 1:9.19.17-1 | |
redhat/bind | <9.9.11 | 9.9.11 |
redhat/bind | <9.10.6 | 9.10.6 |
redhat/bind | <9.11.2 | 9.11.2 |
redhat/bind | <9.12.0 | 9.12.0 |
BIND 9 | >=9.4.0<=9.8.8 | |
BIND 9 | >=9.9.0<=9.9.11 | |
BIND 9 | >=9.10.0<=9.10.6 | |
BIND 9 | >=9.11.0<=9.11.2 | |
BIND 9 | =9.9.3-s1 | |
BIND 9 | =9.9.11-s1 | |
BIND 9 | =9.10.5-s1 | |
BIND 9 | =9.10.6-s1 | |
BIND 9 | =9.12.0-alpha1 | |
BIND 9 | =9.12.0-b1 | |
BIND 9 | =9.12.0-b2 | |
BIND 9 | =9.12.0-rc1 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =6.4 | |
redhat enterprise Linux server aus | =6.5 | |
redhat enterprise Linux server aus | =6.6 | |
redhat enterprise Linux server aus | =7.2 | |
redhat enterprise Linux server aus | =7.3 | |
redhat enterprise Linux server aus | =7.4 | |
redhat enterprise Linux server aus | =7.6 | |
redhat enterprise Linux server eus | =6.7 | |
redhat enterprise Linux server eus | =7.3 | |
redhat enterprise Linux server eus | =7.4 | |
redhat enterprise Linux server eus | =7.5 | |
redhat enterprise Linux server eus | =7.6 | |
redhat enterprise Linux server tus | =6.6 | |
redhat enterprise Linux server tus | =7.2 | |
redhat enterprise Linux server tus | =7.3 | |
redhat enterprise Linux server tus | =7.6 | |
redhat enterprise Linux workstation | =6.0 | |
redhat enterprise Linux workstation | =7.0 | |
Debian GNU/Linux | =7.0 | |
Debian GNU/Linux | =8.0 | |
Debian GNU/Linux | =9.0 | |
NetApp Data ONTAP Edge | ||
Juniper JUNOS | =12.1x46-d76 | |
Juniper JUNOS | =12.3x48-d70 | |
Juniper JUNOS | =15.1x49-d140 | |
Juniper JUNOS | =17.4r2 | |
Juniper JUNOS | =18.1r2 | |
Juniper JUNOS | =18.2r1 | |
Juniper SRX100 | ||
Juniper SRX110 | ||
Juniper SRX1400 | ||
Juniper SRX1500 | ||
Juniper SRX210 | ||
Juniper SRX220 | ||
Juniper SRX240 | ||
Juniper SRX240H2 | ||
Juniper SRX240M | ||
Juniper SRX300 | ||
Juniper SRX320 | ||
Juniper SRX340 | ||
Juniper SRX3400 | ||
Juniper SRX345 | ||
Juniper SRX3600 | ||
Juniper SRX380 | ||
Juniper SRX4000 | ||
Juniper SRX4100 | ||
Juniper SRX4200 | ||
Juniper SRX4600 | ||
Juniper SRX5000 | ||
Juniper SRX5400 | ||
Juniper SRX550 | ||
Juniper SRX550 | ||
Juniper SRX550 | ||
juniper srx5600 | ||
Juniper SRX5800 | ||
Juniper SRX650 |
Upgrade to the patched release most closely related to your current version of BIND. These can all be downloaded from http://www.isc.org/downloads. BIND 9 version 9.9.11-P1 BIND 9 version 9.10.6-P1 BIND 9 version 9.11.2-P1 BIND 9 version 9.12.0rc2 BIND Supported Preview Edition is a special feature preview branch of BIND provided to eligible ISC support customers. BIND 9 version 9.9.11-S2 BIND 9 version 9.10.6-S2
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-3145 is classified as a high severity vulnerability due to its potential to cause assertion failures and crashes in BIND.
To fix CVE-2017-3145, update BIND to the latest patched version as specified by your operating system provider.
CVE-2017-3145 affects BIND versions 9.0.0 to 9.8.x, 9.9.0 to 9.9.11, and 9.10.0 to 9.10.6 among others.
Yes, CVE-2017-3145 is a use-after-free vulnerability which can lead to crashes of the BIND service.
You can verify vulnerability to CVE-2017-3145 by checking the BIND version installed on your system against the affected versions list.