Lucene search

K
f5F5F5:K02230327
HistoryJun 30, 2017 - 12:00 a.m.

K02230327 : BIND vulnerability CVE-2017-3143

2017-06-3000:00:00
my.f5.com
32

5.4 Medium

AI Score

Confidence

High

0.04 Low

EPSS

Percentile

92.1%

Security Advisory Description

An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name for the zone and service being targeted may be able to manipulate BIND into accepting an unauthorized dynamic update. Affects BIND 9.4.0->9.8.8, 9.9.0->9.9.10-P1, 9.10.0->9.10.5-P1, 9.11.0->9.11.1-P1, 9.9.3-S1->9.9.10-S2, 9.10.5-S1->9.10.5-S2. (CVE-2017-3143)

Impact

BIG-IP

An attacker may be able to manipulate the contents of a zone when the vulnerability is exploited. For the BIG-IP system to be considered vulnerable, it must have allowed remote update with TSIG authentication configured in BIND. This configuration combination is not a default configuration.

F5 iWorkflow, BIG-IQ, and Enterprise Manager

There is no impact. Although the BIG-IQ and Enterprise Manager software contain the vulnerable code, the BIG-IQ and Enterprise Manager systems do not use the vulnerable code in a way that exposes the vulnerability in default, standard, or recommended configurations.