Unrated severityNVD Advisory· Published Jan 16, 2019· Updated Sep 16, 2024
Combination of DNS64 and RPZ Can Lead to Crash
CVE-2017-3135
Description
Under some conditions when using both DNS64 and RPZ to rewrite query responses, query processing can resume in an inconsistent state leading to either an INSIST assertion failure or an attempt to read through a NULL pointer. Affects BIND 9.8.8, 9.9.3-S1 -> 9.9.9-S7, 9.9.3 -> 9.9.9-P5, 9.9.10b1, 9.10.0 -> 9.10.4-P5, 9.10.5b1, 9.11.0 -> 9.11.0-P2, 9.11.1b1.
Affected products
22- osv-coords21 versionspkg:rpm/opensuse/bind&distro=openSUSE%20Tumbleweedpkg:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP1pkg:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2pkg:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-TERADATApkg:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1pkg:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2pkg:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20Server%20for%20Raspberry%20Pi%2012%20SP2pkg:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4pkg:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP1pkg:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP2pkg:rpm/suse/bind&distro=SUSE%20Manager%202.1pkg:rpm/suse/bind&distro=SUSE%20Manager%20Proxy%202.1pkg:rpm/suse/bind&distro=SUSE%20OpenStack%20Cloud%205
< 9.16.20-1.4+ 20 more
- (no CPE)range: < 9.16.20-1.4
- (no CPE)range: < 9.9.9P1-56.1
- (no CPE)range: < 9.9.9P1-56.1
- (no CPE)range: < 9.9.6P1-0.39.1
- (no CPE)range: < 9.9.6P1-0.39.1
- (no CPE)range: < 9.9.6P1-0.39.1
- (no CPE)range: < 9.9.6P1-0.39.1
- (no CPE)range: < 9.9.9P1-56.1
- (no CPE)range: < 9.9.9P1-56.1
- (no CPE)range: < 9.9.9P1-28.29.1
- (no CPE)range: < 9.9.9P1-56.1
- (no CPE)range: < 9.9.6P1-0.39.1
- (no CPE)range: < 9.9.9P1-28.29.1
- (no CPE)range: < 9.9.9P1-56.1
- (no CPE)range: < 9.9.9P1-56.1
- (no CPE)range: < 9.9.6P1-0.39.1
- (no CPE)range: < 9.9.9P1-56.1
- (no CPE)range: < 9.9.9P1-56.1
- (no CPE)range: < 9.9.6P1-0.39.1
- (no CPE)range: < 9.9.6P1-0.39.1
- (no CPE)range: < 9.9.6P1-0.39.1
- ISC/BIND 9v5Range: BIND 9 9.8.8, 9.9.3-S1 -> 9.9.9-S7, 9.9.3 -> 9.9.9-P5, 9.9.10b1, 9.10.0 -> 9.10.4-P5, 9.10.5b1, 9.11.0 -> 9.11.0-P2, 9.11.1b1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- rhn.redhat.com/errata/RHSA-2017-0276.htmlmitrevendor-advisoryx_refsource_REDHAT
- security.gentoo.org/glsa/201708-01mitrevendor-advisoryx_refsource_GENTOO
- www.debian.org/security/2017/dsa-3795mitrevendor-advisoryx_refsource_DEBIAN
- www.securityfocus.com/bid/96150mitrevdb-entryx_refsource_BID
- www.securitytracker.com/id/1037801mitrevdb-entryx_refsource_SECTRACK
- h20566.www2.hpe.com/hpsc/doc/public/displaymitrex_refsource_CONFIRM
- kb.isc.org/docs/aa-01453mitrex_refsource_CONFIRM
- security.netapp.com/advisory/ntap-20180926-0005/mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.