| Name | CVE-2017-3143 | 
| Description | An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name for the zone and service being targeted may be able to manipulate BIND into accepting an unauthorized dynamic update. Affects BIND 9.4.0->9.8.8, 9.9.0->9.9.10-P1, 9.10.0->9.10.5-P1, 9.11.0->9.11.1-P1, 9.9.3-S1->9.9.10-S2, 9.10.5-S1->9.10.5-S2. | 
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) | 
| References | DLA-1025-1, DSA-3904-1 | 
| Debian Bugs | 866564 | 
The table below lists information on source packages.
| Source Package | Release | Version | Status | 
|---|---|---|---|
| bind9 (PTS) | bullseye | 1:9.16.50-1~deb11u2 | fixed | 
| bullseye (security) | 1:9.16.50-1~deb11u3 | fixed | |
| bookworm | 1:9.18.33-1~deb12u2 | fixed | |
| bookworm (security) | 1:9.18.41-1~deb12u1 | fixed | |
| trixie | 1:9.20.11-4 | fixed | |
| trixie (security) | 1:9.20.15-1~deb13u1 | fixed | |
| forky, sid | 1:9.20.15-2 | fixed | 
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs | 
|---|---|---|---|---|---|---|
| bind9 | source | wheezy | 1:9.8.4.dfsg.P1-6+nmu2+deb7u17 | DLA-1025-1 | ||
| bind9 | source | jessie | 1:9.9.5.dfsg-9+deb8u12 | DSA-3904-1 | ||
| bind9 | source | stretch | 1:9.10.3.dfsg.P4-12.3+deb9u1 | DSA-3904-1 | ||
| bind9 | source | (unstable) | 1:9.10.3.dfsg.P4-12.4 | 866564 | 
https://kb.isc.org/article/AA-01503
Fixed by (master): https://source.isc.org/cgi-bin/gitweb.cgi?p=bind9.git;a=commitdiff;h=581c1526ab0f74a177980da9ff0514f795ed8669