CVE-2017-3142

NameCVE-2017-3142
DescriptionAn attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name may be able to circumvent TSIG authentication of AXFR requests via a carefully constructed request packet. A server that relies solely on TSIG keys for protection with no other ACL protection could be manipulated into: providing an AXFR of a zone to an unauthorized recipient or accepting bogus NOTIFY packets. Affects BIND 9.4.0->9.8.8, 9.9.0->9.9.10-P1, 9.10.0->9.10.5-P1, 9.11.0->9.11.1-P1, 9.9.3-S1->9.9.10-S2, 9.10.5-S1->9.10.5-S2.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1025-1, DSA-3904-1
NVD severitymedium (attack range: remote)
Debian Bugs866564

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
bind9 (PTS)jessie1:9.9.5.dfsg-9+deb8u15fixed
jessie (security)1:9.9.5.dfsg-9+deb8u18fixed
stretch (security), stretch1:9.10.3.dfsg.P4-12.3+deb9u5fixed
buster, bullseye, sid1:9.11.5.P4+dfsg-5.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
bind9source(unstable)1:9.10.3.dfsg.P4-12.4medium866564
bind9sourcejessie1:9.9.5.dfsg-9+deb8u12mediumDSA-3904-1
bind9sourcestretch1:9.10.3.dfsg.P4-12.3+deb9u1mediumDSA-3904-1
bind9sourcewheezy1:9.8.4.dfsg.P1-6+nmu2+deb7u17mediumDLA-1025-1

Notes

https://kb.isc.org/article/AA-01504
Fixed by (master): https://source.isc.org/cgi-bin/gitweb.cgi?p=bind9.git;a=commitdiff;h=581c1526ab0f74a177980da9ff0514f795ed8669

Search for package or bug name: Reporting problems