CVE-2017-3135

Severity
5.9MEDIUM
EPSS
34.4%
top 3.01%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 16
Latest updateMay 13

Description

Under some conditions when using both DNS64 and RPZ to rewrite query responses, query processing can resume in an inconsistent state leading to either an INSIST assertion failure or an attempt to read through a NULL pointer. Affects BIND 9.8.8, 9.9.3-S1 -> 9.9.9-S7, 9.9.3 -> 9.9.9-P5, 9.9.10b1, 9.10.0 -> 9.10.4-P5, 9.10.5b1, 9.11.0 -> 9.11.0-P2, 9.11.1b1.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages6 packages

Debianbind9< 1:9.10.3.dfsg.P4-12+3
NVDisc/bind9 versions+8
CVEListV5isc/bind_9BIND 9 9.8.8, 9.9.3-S1 -> 9.9.9-S7, 9.9.3 -> 9.9.9-P5, 9.9.10b1, 9.10.0 -> 9.10.4-P5, 9.10.5b1, 9.11.0 -> 9.11.0-P2, 9.11.1b1

Also affects: Debian Linux 8.0, 9.0, Enterprise Linux 7.3, 7.4, 7.6, 7.5

🔴Vulnerability Details

3
GHSA
GHSA-369c-w4jq-mxgx: Under some conditions when using both DNS64 and RPZ to rewrite query responses, query processing can resume in an inconsistent state leading to either2022-05-13
OSV
CVE-2017-3135: Under some conditions when using both DNS64 and RPZ to rewrite query responses, query processing can resume in an inconsistent state leading to either2019-01-16
CVEList
Combination of DNS64 and RPZ Can Lead to Crash2019-01-16

📋Vendor Advisories

3
Ubuntu
Bind vulnerabilities2017-02-16
Red Hat
bind: Assertion failure when using DNS64 and RPZ Can Lead to Crash2017-02-08
Debian
CVE-2017-3135: bind9 - Under some conditions when using both DNS64 and RPZ to rewrite query responses, ...2017

💬Community

3
Bugzilla
CVE-2017-3135 bind99: bind: Assertion failure when using DNS64 and RPZ Can Lead to Crash [fedora-all]2017-02-09
Bugzilla
CVE-2017-3135 bind: Assertion failure when using DNS64 and RPZ Can Lead to Crash [fedora-all]2017-02-09
Bugzilla
CVE-2017-3135 bind: Assertion failure when using DNS64 and RPZ Can Lead to Crash2017-02-08
CVE-2017-3135 (MEDIUM CVSS 5.9) | Under some conditions when using bo | cvebase.io