Lucene search

K
f5F5F5:K49116387
HistoryJun 14, 2017 - 12:00 a.m.

K49116387 : BIND vulnerabilities CVE-2017-3140 and CVE-2017-3141

2017-06-1400:00:00
my.f5.com
31

5.9 Medium

AI Score

Confidence

High

0.116 Low

EPSS

Percentile

95.3%

Security Advisory Description

If named is configured to use Response Policy Zones (RPZ) an error processing some rule types can lead to a condition where BIND will endlessly loop while handling a query. Affects BIND 9.9.10, 9.10.5, 9.11.0->9.11.1, 9.9.10-S1, 9.10.5-S1.

An error processing RPZ rules can cause named to loop endlessly after handling a query.

The BIND installer on Windows uses an unquoted service path which can enable a local user to achieve privilege escalation if the host file system permissions allow this. Affects BIND 9.2.6-P2->9.2.9, 9.3.2-P1->9.3.6, 9.4.0->9.8.8, 9.9.0->9.9.10, 9.10.0->9.10.5, 9.11.0->9.11.1, 9.9.3-S1->9.9.10-S1, 9.10.5-S1.

Windows service and uninstall paths are not quoted when BIND is installed.

Impact

There is no impact; F5 products are not affected by these vulnerabilities.

  • For CVE-2017-3140, F5 products do not ship the versions of BIND that are affected by this vulnerability.
  • For CVE-2017-3141, the vulnerability exists in the installer delivered with BIND for the Microsoft Windows systems and not within BIND itself. F5 products are not affected.