BIND was improperly sequencing cleanup operations on upstream recursion fetch contexts, leading in some cases to a use-after-free error that can trigger an assertion failure and crash in named. Affects BIND 9.0.0 to 9.8.x, 9.9.0 to 9.9.11, 9.10.0 to 9.10.6, 9.11.0 to 9.11.2, 9.9.3-S1 to 9.9.11-S1, 9.10.5-S1 to 9.10.6-S1, 9.12.0a1 to 9.12.0rc1.
References
Link | Resource |
---|---|
https://kb.isc.org/docs/aa-01542 | Vendor Advisory |
https://www.debian.org/security/2018/dsa-4089 | Third Party Advisory |
https://security.netapp.com/advisory/ntap-20180117-0003/ | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2018/01/msg00029.html | Mailing List Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:0488 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:0487 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:0102 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:0101 | Third Party Advisory |
http://www.securitytracker.com/id/1040195 | Broken Link Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/102716 | Broken Link Third Party Advisory VDB Entry |
https://supportportal.juniper.net/s/article/2018-07-Security-Bulletin-SRX-Series-Vulnerabilities-in-ISC-BIND-named | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
AND |
|
History
21 Jun 2023, 18:19
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:12.3x48-d70:-:*:*:*:*:*:* cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:18.1r2:-:*:*:*:*:*:* cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:15.1x49-d140:-:*:*:*:*:*:* cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:18.2r1:-:*:*:*:*:*:* cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:17.4r2:-:*:*:*:*:*:* cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:12.1x46-d76:-:*:*:*:*:*:* cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:* |
|
First Time |
Juniper srx550
Juniper srx5400 Juniper srx110 Juniper srx4100 Juniper srx5600 Juniper srx5800 Juniper srx240m Juniper srx300 Juniper srx1400 Juniper srx220 Juniper srx340 Juniper srx3400 Juniper srx1500 Juniper srx100 Juniper srx320 Juniper junos Juniper srx4000 Juniper srx550m Juniper srx210 Juniper srx4200 Juniper srx345 Juniper srx4600 Juniper srx240h2 Juniper srx550 Hm Juniper srx5000 Juniper srx3600 Juniper Juniper srx380 Juniper srx650 Juniper srx240 |
|
References | (MISC) https://supportportal.juniper.net/s/article/2018-07-Security-Bulletin-SRX-Series-Vulnerabilities-in-ISC-BIND-named - Third Party Advisory | |
References | (SECTRACK) http://www.securitytracker.com/id/1040195 - Broken Link, Third Party Advisory, VDB Entry | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2018/01/msg00029.html - Mailing List, Third Party Advisory | |
References | (BID) http://www.securityfocus.com/bid/102716 - Broken Link, Third Party Advisory, VDB Entry |
16 Jun 2023, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2019-01-16 20:29
Updated : 2023-06-21 18:19
NVD link : CVE-2017-3145
Mitre link : CVE-2017-3145
JSON object : View
Products Affected
juniper
- srx380
- junos
- srx1500
- srx3400
- srx240h2
- srx300
- srx220
- srx4000
- srx5000
- srx550_hm
- srx5600
- srx345
- srx5400
- srx100
- srx210
- srx110
- srx320
- srx4600
- srx550m
- srx1400
- srx340
- srx550
- srx3600
- srx4100
- srx4200
- srx240
- srx5800
- srx650
- srx240m
redhat
- enterprise_linux_desktop
- enterprise_linux_server_eus
- enterprise_linux_server_aus
- enterprise_linux_server_tus
- enterprise_linux_server
- enterprise_linux_workstation
debian
- debian_linux
isc
- bind
netapp
- data_ontap_edge
CWE
CWE-416
Use After Free