Vulnerabilities > CVE-2017-3135 - NULL Pointer Dereference vulnerability in multiple products

047910
CVSS 4.3 - MEDIUM
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL

Summary

Under some conditions when using both DNS64 and RPZ to rewrite query responses, query processing can resume in an inconsistent state leading to either an INSIST assertion failure or an attempt to read through a NULL pointer. Affects BIND 9.8.8, 9.9.3-S1 -> 9.9.9-S7, 9.9.3 -> 9.9.9-P5, 9.9.10b1, 9.10.0 -> 9.10.4-P5, 9.10.5b1, 9.11.0 -> 9.11.0-P2, 9.11.1b1.

Common Weakness Enumeration (CWE)

Nessus

  • NASL familyVirtuozzo Local Security Checks
    NASL idVIRTUOZZO_VZLSA-2017-0276.NASL
    descriptionAn update for bind is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es) : * A denial of service flaw was found in the way BIND handled query responses when both DNS64 and RPZ were used. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure or a NULL pointer dereference via a specially crafted DNS response. (CVE-2017-3135) Red Hat would like to thank ISC for reporting this issue. Upstream acknowledges Ramesh Damodaran (Infoblox) and Aliaksandr Shubnik (Infoblox) as the original reporter. Note that Tenable Network Security has attempted to extract the preceding description block directly from the corresponding Red Hat security advisory. Virtuozzo provides no description for VZLSA advisories. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id101423
    published2017-07-13
    reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/101423
    titleVirtuozzo 7 : bind / bind-chroot / bind-devel / bind-libs / etc (VZLSA-2017-0276)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(101423);
      script_version("1.8");
      script_cvs_date("Date: 2019/02/12  9:22:59");
    
      script_cve_id(
        "CVE-2017-3135"
      );
    
      script_name(english:"Virtuozzo 7 : bind / bind-chroot / bind-devel / bind-libs / etc (VZLSA-2017-0276)");
      script_summary(english:"Checks the rpm output for the updated package.");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote Virtuozzo host is missing a security update.");
      script_set_attribute(attribute:"description", value:
    "An update for bind is now available for Red Hat Enterprise Linux 7.
    
    Red Hat Product Security has rated this update as having a security
    impact of Moderate. A Common Vulnerability Scoring System (CVSS) base
    score, which gives a detailed severity rating, is available for each
    vulnerability from the CVE link(s) in the References section.
    
    The Berkeley Internet Name Domain (BIND) is an implementation of the
    Domain Name System (DNS) protocols. BIND includes a DNS server
    (named); a resolver library (routines for applications to use when
    interfacing with DNS); and tools for verifying that the DNS server is
    operating correctly.
    
    Security Fix(es) :
    
    * A denial of service flaw was found in the way BIND handled query
    responses when both DNS64 and RPZ were used. A remote attacker could
    use this flaw to make named exit unexpectedly with an assertion
    failure or a NULL pointer dereference via a specially crafted DNS
    response. (CVE-2017-3135)
    
    Red Hat would like to thank ISC for reporting this issue. Upstream
    acknowledges Ramesh Damodaran (Infoblox) and Aliaksandr Shubnik
    (Infoblox) as the original reporter.
    
    Note that Tenable Network Security has attempted to extract the
    preceding description block directly from the corresponding Red Hat
    security advisory. Virtuozzo provides no description for VZLSA
    advisories. Tenable has attempted to automatically clean and format
    it as much as possible without introducing additional issues.");
      # http://repo.virtuozzo.com/vzlinux/announcements/json/VZLSA-2017-0276.json
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?b6f87aa6");
      script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2017-0276");
      script_set_attribute(attribute:"solution", value:
    "Update the affected bind / bind-chroot / bind-devel / bind-libs / etc package.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:ND");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:F/RL:O/RC:X");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2017/02/15");
      script_set_attribute(attribute:"plugin_publication_date", value:"2017/07/13");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:virtuozzo:virtuozzo:bind");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:virtuozzo:virtuozzo:bind-chroot");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:virtuozzo:virtuozzo:bind-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:virtuozzo:virtuozzo:bind-libs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:virtuozzo:virtuozzo:bind-libs-lite");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:virtuozzo:virtuozzo:bind-license");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:virtuozzo:virtuozzo:bind-lite-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:virtuozzo:virtuozzo:bind-pkcs11");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:virtuozzo:virtuozzo:bind-pkcs11-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:virtuozzo:virtuozzo:bind-pkcs11-libs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:virtuozzo:virtuozzo:bind-pkcs11-utils");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:virtuozzo:virtuozzo:bind-sdb");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:virtuozzo:virtuozzo:bind-sdb-chroot");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:virtuozzo:virtuozzo:bind-utils");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:virtuozzo:virtuozzo:7");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Virtuozzo Local Security Checks");
    
      script_copyright(english:"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Virtuozzo/release", "Host/Virtuozzo/rpm-list");
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    
    release = get_kb_item("Host/Virtuozzo/release");
    if (isnull(release) || "Virtuozzo" >!< release) audit(AUDIT_OS_NOT, "Virtuozzo");
    os_ver = pregmatch(pattern: "Virtuozzo Linux release ([0-9]+\.[0-9])(\D|$)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Virtuozzo");
    os_ver = os_ver[1];
    if (! preg(pattern:"^7([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Virtuozzo 7.x", "Virtuozzo " + os_ver);
    
    if (!get_kb_item("Host/Virtuozzo/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Virtuozzo", cpu);
    
    flag = 0;
    
    pkgs = ["bind-9.9.4-38.vl7.2",
            "bind-chroot-9.9.4-38.vl7.2",
            "bind-devel-9.9.4-38.vl7.2",
            "bind-libs-9.9.4-38.vl7.2",
            "bind-libs-lite-9.9.4-38.vl7.2",
            "bind-license-9.9.4-38.vl7.2",
            "bind-lite-devel-9.9.4-38.vl7.2",
            "bind-pkcs11-9.9.4-38.vl7.2",
            "bind-pkcs11-devel-9.9.4-38.vl7.2",
            "bind-pkcs11-libs-9.9.4-38.vl7.2",
            "bind-pkcs11-utils-9.9.4-38.vl7.2",
            "bind-sdb-9.9.4-38.vl7.2",
            "bind-sdb-chroot-9.9.4-38.vl7.2",
            "bind-utils-9.9.4-38.vl7.2"];
    
    foreach (pkg in pkgs)
      if (rpm_check(release:"Virtuozzo-7", reference:pkg)) flag++;
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_WARNING,
        extra      : rpm_report_get()
      );
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "bind / bind-chroot / bind-devel / bind-libs / etc");
    }
    
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2017-2B46C8B6C2.NASL
    descriptionSecurity fix for CVE-2017-3135 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2017-02-15
    plugin id97162
    published2017-02-15
    reporterThis script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/97162
    titleFedora 25 : 32:bind (2017-2b46c8b6c2)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Fedora Security Advisory FEDORA-2017-2b46c8b6c2.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(97162);
      script_version("3.6");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04");
    
      script_cve_id("CVE-2017-3135");
      script_xref(name:"FEDORA", value:"2017-2b46c8b6c2");
    
      script_name(english:"Fedora 25 : 32:bind (2017-2b46c8b6c2)");
      script_summary(english:"Checks rpm output for the updated package.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Fedora host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Security fix for CVE-2017-3135
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Fedora update system website.
    Tenable has attempted to automatically clean and format it as much as
    possible without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bodhi.fedoraproject.org/updates/FEDORA-2017-2b46c8b6c2"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected 32:bind package."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:32:bind");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:25");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2019/01/16");
      script_set_attribute(attribute:"patch_publication_date", value:"2017/02/14");
      script_set_attribute(attribute:"plugin_publication_date", value:"2017/02/15");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Fedora Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
    os_ver = pregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
    os_ver = os_ver[1];
    if (! preg(pattern:"^25([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 25", "Fedora " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
    
    
    flag = 0;
    if (rpm_check(release:"FC25", reference:"bind-9.10.4-4.P6.fc25", epoch:"32")) flag++;
    
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_WARNING,
        extra      : rpm_report_get()
      );
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "32:bind");
    }
    
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2017-96B7F4F53E.NASL
    descriptionSecurity fix for CVE-2017-3135 (unaffected), fixes regression made by CVE-2016-8864 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2017-03-06
    plugin id97536
    published2017-03-06
    reporterThis script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/97536
    titleFedora 25 : bind99 (2017-96b7f4f53e)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201708-01.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201708-01 (BIND: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in BIND. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could send a specially crafted DNS request to the BIND resolver resulting in a Denial of Service condition. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id102531
    published2017-08-17
    reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/102531
    titleGLSA-201708-01 : BIND: Multiple vulnerabilities
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2017-0596-1.NASL
    descriptionThis update for bind fixes the following issues : - Fixed a possible denial of service vulnerability (affected only configurations using both DNS64 and RPZ, CVE-2017-3135, bsc#1024130) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id97520
    published2017-03-03
    reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/97520
    titleSUSE SLED12 / SLES12 Security Update : bind (SUSE-SU-2017:0596-1)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2017-27099C270A.NASL
    descriptionSecurity fix for CVE-2017-3135 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2017-02-21
    plugin id97242
    published2017-02-21
    reporterThis script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/97242
    titleFedora 24 : 32:bind (2017-27099c270a)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2017-0594-1.NASL
    descriptionThis update for bind fixes the following issues : - Fixed a possible denial of service vulnerability (affected only configurations using both DNS64 and RPZ, CVE-2017-3135, bsc#1024130) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id97518
    published2017-03-03
    reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/97518
    titleSUSE SLES12 Security Update : bind (SUSE-SU-2017:0594-1)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-3795.NASL
    descriptionIt was discovered that a maliciously crafted query can cause ISC
    last seen2020-06-01
    modified2020-06-02
    plugin id97399
    published2017-02-27
    reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/97399
    titleDebian DSA-3795-1 : bind9 - security update
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2017-314.NASL
    descriptionThis update for bind fixes the following issues : - Fixed a possible denial of service vulnerability (affected only configurations using both DNS64 and RPZ, CVE-2017-3135, bsc#1024130) This update was imported from the SUSE:SLE-12-SP1:Update update project.
    last seen2020-06-05
    modified2017-03-07
    plugin id97568
    published2017-03-07
    reporterThis script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/97568
    titleopenSUSE Security Update : bind (openSUSE-2017-314)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2017-0276.NASL
    descriptionFrom Red Hat Security Advisory 2017:0276 : An update for bind is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es) : * A denial of service flaw was found in the way BIND handled query responses when both DNS64 and RPZ were used. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure or a NULL pointer dereference via a specially crafted DNS response. (CVE-2017-3135) Red Hat would like to thank ISC for reporting this issue. Upstream acknowledges Ramesh Damodaran (Infoblox) and Aliaksandr Shubnik (Infoblox) as the original reporter.
    last seen2020-06-01
    modified2020-06-02
    plugin id97198
    published2017-02-16
    reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/97198
    titleOracle Linux 7 : bind (ELSA-2017-0276)
  • NASL familySlackware Local Security Checks
    NASL idSLACKWARE_SSA_2017-041-01.NASL
    descriptionNew bind packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, 14.2, and -current to fix a security issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id97101
    published2017-02-13
    reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/97101
    titleSlackware 13.0 / 13.1 / 13.37 / 14.0 / 14.1 / 14.2 / current : bind (SSA:2017-041-01)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2017-0276.NASL
    descriptionAn update for bind is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es) : * A denial of service flaw was found in the way BIND handled query responses when both DNS64 and RPZ were used. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure or a NULL pointer dereference via a specially crafted DNS response. (CVE-2017-3135) Red Hat would like to thank ISC for reporting this issue. Upstream acknowledges Ramesh Damodaran (Infoblox) and Aliaksandr Shubnik (Infoblox) as the original reporter.
    last seen2020-06-01
    modified2020-06-02
    plugin id97200
    published2017-02-16
    reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/97200
    titleRHEL 7 : bind (RHSA-2017:0276)
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-3201-1.NASL
    descriptionIt was discovered that Bind incorrectly handled rewriting certain query responses when using both DNS64 and RPZ. A remote attacker could possibly use this issue to cause Bind to crash, resulting in a denial of service. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id97223
    published2017-02-17
    reporterUbuntu Security Notice (C) 2017-2019 Canonical, Inc. / NASL script (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/97223
    titleUbuntu 12.04 LTS / 14.04 LTS / 16.04 LTS / 16.10 : bind9 vulnerabilities (USN-3201-1)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2017-D0C9BF9508.NASL
    descriptionSecurity fix for CVE-2017-3135 (unaffected), fixes regression made by CVE-2016-8864 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2017-03-06
    plugin id97541
    published2017-03-06
    reporterThis script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/97541
    titleFedora 24 : bind99 (2017-d0c9bf9508)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2017-0276.NASL
    descriptionAn update for bind is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es) : * A denial of service flaw was found in the way BIND handled query responses when both DNS64 and RPZ were used. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure or a NULL pointer dereference via a specially crafted DNS response. (CVE-2017-3135) Red Hat would like to thank ISC for reporting this issue. Upstream acknowledges Ramesh Damodaran (Infoblox) and Aliaksandr Shubnik (Infoblox) as the original reporter.
    last seen2020-06-01
    modified2020-06-02
    plugin id97194
    published2017-02-16
    reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/97194
    titleCentOS 7 : bind (CESA-2017:0276)
  • NASL familyF5 Networks Local Security Checks
    NASL idF5_BIGIP_SOL80533167.NASL
    descriptionUnder some conditions when using both DNS64 and RPZ to rewrite query responses, query processing can resume in an inconsistent state leading to either an INSIST assertion failure or an attempt to read through a NULL pointer. Affects BIND 9.8.8, 9.9.3-S1 -> 9.9.9-S7, 9.9.3 -> 9.9.9-P5, 9.9.10b1, 9.10.0 -> 9.10.4-P5, 9.10.5b1, 9.11.0 -> 9.11.0-P2, 9.11.1b1. (CVE-2015-3135) BIG-IP configurations using DNS64 (the DNS IPv6 to IPv4 option configured in the DNS profile) and Response Policy Zone (RPZ) rewriting (in the BIND configuration) together are affected by this CVE. Note : The DNS IPv6 to IPv4 option is disabled, by default, in the DNS profile. Note : RPZ Rewriting is an optional BIND 9.x configuration that allows administrators to create DNS blacklists. Impact Remote attackers may be able to cause a BIND denial-of-service (DoS) attack by making a query for an AAAA record.
    last seen2020-06-01
    modified2020-06-02
    plugin id97333
    published2017-02-23
    reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/97333
    titleF5 Networks BIG-IP : BIND vulnerability (K80533167)
  • NASL familyJunos Local Security Checks
    NASL idJUNIPER_JSA10799.NASL
    descriptionAccording to its self-reported version and model number, the remote Juniper Junos device is affected by a denial of service vulnerability in ISC BIND, specifically in the query_find() function within file bin/named/query.c, when simultaneously using DNS64 and RPZ for query responses. An unauthenticated, remote attacker can exploit this to cause an INSIST assertion failure or a NULL pointer read, resulting in termination of the service.
    last seen2020-06-01
    modified2020-06-02
    plugin id102074
    published2017-07-31
    reporterThis script is Copyright (C) 2017-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/102074
    titleJuniper Junos SRX, vSRX, and J-Series ISC BIND DoS (JSA10799)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2017-1025.NASL
    descriptionAccording to the versions of the bind packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - A denial of service flaw was found in the way BIND handled query responses when both DNS64 and RPZ were used. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure or a null pointer dereference via a specially crafted DNS response. (CVE-2017-3135) - A denial of service flaw was found in the way BIND processed a response to an ANY query. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. (CVE-2016-9131) - A denial of service flaw was found in the way BIND handled a query response containing inconsistent DNSSEC information. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. (CVE-2016-9147) - A denial of service flaw was found in the way BIND handled an unusually-formed DS record response. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. (CVE-2016-9444) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-05-06
    modified2017-05-01
    plugin id99870
    published2017-05-01
    reporterThis script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/99870
    titleEulerOS 2.0 SP1 : bind (EulerOS-SA-2017-1025)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DLA-843.NASL
    descriptionCVE-2017-3135 Assertion failure when using DNS64 and RPZ can lead to crash. For Debian 7
    last seen2020-03-17
    modified2017-03-01
    plugin id97440
    published2017-03-01
    reporterThis script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/97440
    titleDebian DLA-843-1 : bind9 security update
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2017-1026.NASL
    descriptionAccording to the versions of the bind packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - A denial of service flaw was found in the way BIND handled query responses when both DNS64 and RPZ were used. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure or a null pointer dereference via a specially crafted DNS response. (CVE-2017-3135) - A denial of service flaw was found in the way BIND processed a response to an ANY query. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. (CVE-2016-9131) - A denial of service flaw was found in the way BIND handled a query response containing inconsistent DNSSEC information. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. (CVE-2016-9147) - A denial of service flaw was found in the way BIND handled an unusually-formed DS record response. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. (CVE-2016-9444) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-05-06
    modified2017-05-01
    plugin id99871
    published2017-05-01
    reporterThis script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/99871
    titleEulerOS 2.0 SP2 : bind (EulerOS-SA-2017-1026)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20170215_BIND_ON_SL7_X.NASL
    descriptionSecurity Fix(es) : - A denial of service flaw was found in the way BIND handled query responses when both DNS64 and RPZ were used. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure or a NULL pointer dereference via a specially crafted DNS response. (CVE-2017-3135)
    last seen2020-03-18
    modified2017-02-16
    plugin id97201
    published2017-02-16
    reporterThis script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/97201
    titleScientific Linux Security Update : bind on SL7.x x86_64 (20170215)
  • NASL familyDNS
    NASL idBIND9_CVE-2017-3135.NASL
    descriptionAccording to its self-reported version number, the instance of ISC BIND 9 running on the remote name server is 9.8.8 or 9.9.x prior to 9.9.9-P6 or 9.9.9-S8, 9.10.x prior to 9.10.4-P6, or 9.11.x prior to 9.11.0-P3. It is, therefore, affected by a denial of service vulnerability in the query_find() function in query.c that is triggered when using DNS64 and RPZ simultaneously for rewriting query responses. An unauthenticated, remote attacker can exploit this to cause an INSIST assertion failure or a NULL pointer read, resulting in a termination of the service. Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-06-01
    modified2020-06-02
    plugin id97227
    published2017-02-17
    reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/97227
    titleISC BIND 9 < 9.9.9-P6 / 9.9.9-S8 / 9.10.4-P6 / 9.11.0-P3 DNS64 and RPZ DoS
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2017-0595-1.NASL
    descriptionThis update for bind fixes the following issues : - Fixed a possible denial of service vulnerability (affected only configurations using both DNS64 and RPZ, CVE-2017-3135, bsc#1024130) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id97519
    published2017-03-03
    reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/97519
    titleSUSE SLES11 Security Update : bind (SUSE-SU-2017:0595-1)

Redhat

advisories
bugzilla
id1420193
titleCVE-2017-3135 bind: Assertion failure when using DNS64 and RPZ Can Lead to Crash
oval
OR
  • commentRed Hat Enterprise Linux must be installed
    ovaloval:com.redhat.rhba:tst:20070304026
  • AND
    • commentRed Hat Enterprise Linux 7 is installed
      ovaloval:com.redhat.rhba:tst:20150364027
    • OR
      • AND
        • commentbind-pkcs11 is earlier than 32:9.9.4-38.el7_3.2
          ovaloval:com.redhat.rhsa:tst:20170276001
        • commentbind-pkcs11 is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20171767020
      • AND
        • commentbind-sdb is earlier than 32:9.9.4-38.el7_3.2
          ovaloval:com.redhat.rhsa:tst:20170276003
        • commentbind-sdb is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20170651002
      • AND
        • commentbind-chroot is earlier than 32:9.9.4-38.el7_3.2
          ovaloval:com.redhat.rhsa:tst:20170276005
        • commentbind-chroot is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20170651008
      • AND
        • commentbind-pkcs11-devel is earlier than 32:9.9.4-38.el7_3.2
          ovaloval:com.redhat.rhsa:tst:20170276007
        • commentbind-pkcs11-devel is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20171767004
      • AND
        • commentbind-pkcs11-utils is earlier than 32:9.9.4-38.el7_3.2
          ovaloval:com.redhat.rhsa:tst:20170276009
        • commentbind-pkcs11-utils is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20171767014
      • AND
        • commentbind is earlier than 32:9.9.4-38.el7_3.2
          ovaloval:com.redhat.rhsa:tst:20170276011
        • commentbind is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20170651006
      • AND
        • commentbind-sdb-chroot is earlier than 32:9.9.4-38.el7_3.2
          ovaloval:com.redhat.rhsa:tst:20170276013
        • commentbind-sdb-chroot is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20171767018
      • AND
        • commentbind-lite-devel is earlier than 32:9.9.4-38.el7_3.2
          ovaloval:com.redhat.rhsa:tst:20170276015
        • commentbind-lite-devel is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20171767016
      • AND
        • commentbind-pkcs11-libs is earlier than 32:9.9.4-38.el7_3.2
          ovaloval:com.redhat.rhsa:tst:20170276017
        • commentbind-pkcs11-libs is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20171767006
      • AND
        • commentbind-devel is earlier than 32:9.9.4-38.el7_3.2
          ovaloval:com.redhat.rhsa:tst:20170276019
        • commentbind-devel is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20170651004
      • AND
        • commentbind-license is earlier than 32:9.9.4-38.el7_3.2
          ovaloval:com.redhat.rhsa:tst:20170276021
        • commentbind-license is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20171767022
      • AND
        • commentbind-libs-lite is earlier than 32:9.9.4-38.el7_3.2
          ovaloval:com.redhat.rhsa:tst:20170276023
        • commentbind-libs-lite is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20171767024
      • AND
        • commentbind-libs is earlier than 32:9.9.4-38.el7_3.2
          ovaloval:com.redhat.rhsa:tst:20170276025
        • commentbind-libs is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20170651010
      • AND
        • commentbind-utils is earlier than 32:9.9.4-38.el7_3.2
          ovaloval:com.redhat.rhsa:tst:20170276027
        • commentbind-utils is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20170651012
rhsa
idRHSA-2017:0276
released2017-02-15
severityModerate
titleRHSA-2017:0276: bind security update (Moderate)
rpms
  • bind-32:9.9.4-38.el7_3.2
  • bind-chroot-32:9.9.4-38.el7_3.2
  • bind-debuginfo-32:9.9.4-38.el7_3.2
  • bind-devel-32:9.9.4-38.el7_3.2
  • bind-libs-32:9.9.4-38.el7_3.2
  • bind-libs-lite-32:9.9.4-38.el7_3.2
  • bind-license-32:9.9.4-38.el7_3.2
  • bind-lite-devel-32:9.9.4-38.el7_3.2
  • bind-pkcs11-32:9.9.4-38.el7_3.2
  • bind-pkcs11-devel-32:9.9.4-38.el7_3.2
  • bind-pkcs11-libs-32:9.9.4-38.el7_3.2
  • bind-pkcs11-utils-32:9.9.4-38.el7_3.2
  • bind-sdb-32:9.9.4-38.el7_3.2
  • bind-sdb-chroot-32:9.9.4-38.el7_3.2
  • bind-utils-32:9.9.4-38.el7_3.2