4.3 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
0.04 Low
EPSS
Percentile
92.1%
Issue Overview:
Security Fix(es): A flaw was found in the way BIND handled TSIG authentication for dynamic updates. A remote attacker able to communicate with an authoritative BIND server could use this flaw to manipulate the contents of a zone, by forging a valid TSIG or SIG(0) signature for a dynamic update request. A flaw was found in the way BIND handled TSIG authentication of AXFR requests. A remote attacker, able to communicate with an authoritative BIND server, could use this flaw to view the entire contents of a zone by sending a specially constructed request packet. (CVE-2017-3142, CVE-2017-3143)
Affected Packages:
bind
Issue Correction:
Run yum update bind to update your system.
New Packages:
i686:
bind-sdb-9.8.2-0.62.rc1.56.amzn1.i686
bind-libs-9.8.2-0.62.rc1.56.amzn1.i686
bind-debuginfo-9.8.2-0.62.rc1.56.amzn1.i686
bind-devel-9.8.2-0.62.rc1.56.amzn1.i686
bind-utils-9.8.2-0.62.rc1.56.amzn1.i686
bind-chroot-9.8.2-0.62.rc1.56.amzn1.i686
bind-9.8.2-0.62.rc1.56.amzn1.i686
src:
bind-9.8.2-0.62.rc1.56.amzn1.src
x86_64:
bind-devel-9.8.2-0.62.rc1.56.amzn1.x86_64
bind-chroot-9.8.2-0.62.rc1.56.amzn1.x86_64
bind-utils-9.8.2-0.62.rc1.56.amzn1.x86_64
bind-9.8.2-0.62.rc1.56.amzn1.x86_64
bind-debuginfo-9.8.2-0.62.rc1.56.amzn1.x86_64
bind-sdb-9.8.2-0.62.rc1.56.amzn1.x86_64
bind-libs-9.8.2-0.62.rc1.56.amzn1.x86_64
Red Hat: CVE-2017-3142, CVE-2017-3143
Mitre: CVE-2017-3142, CVE-2017-3143
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 1 | i686 | bind-sdb | < 9.8.2-0.62.rc1.56.amzn1 | bind-sdb-9.8.2-0.62.rc1.56.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | bind-libs | < 9.8.2-0.62.rc1.56.amzn1 | bind-libs-9.8.2-0.62.rc1.56.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | bind-debuginfo | < 9.8.2-0.62.rc1.56.amzn1 | bind-debuginfo-9.8.2-0.62.rc1.56.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | bind-devel | < 9.8.2-0.62.rc1.56.amzn1 | bind-devel-9.8.2-0.62.rc1.56.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | bind-utils | < 9.8.2-0.62.rc1.56.amzn1 | bind-utils-9.8.2-0.62.rc1.56.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | bind-chroot | < 9.8.2-0.62.rc1.56.amzn1 | bind-chroot-9.8.2-0.62.rc1.56.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | bind | < 9.8.2-0.62.rc1.56.amzn1 | bind-9.8.2-0.62.rc1.56.amzn1.i686.rpm |
Amazon Linux | 1 | x86_64 | bind-devel | < 9.8.2-0.62.rc1.56.amzn1 | bind-devel-9.8.2-0.62.rc1.56.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | bind-chroot | < 9.8.2-0.62.rc1.56.amzn1 | bind-chroot-9.8.2-0.62.rc1.56.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | bind-utils | < 9.8.2-0.62.rc1.56.amzn1 | bind-utils-9.8.2-0.62.rc1.56.amzn1.x86_64.rpm |
4.3 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
0.04 Low
EPSS
Percentile
92.1%