5.9
CVSSv3

CVE-2017-3143

Published: 16/01/2019 Updated: 03/10/2019
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.9 | Impact Score: 3.6 | Exploitability Score: 2.2
VMScore: 385
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name for the zone and service being targeted may be able to manipulate BIND into accepting an unauthorized dynamic update. Affects BIND 9.4.0->9.8.8, 9.9.0->9.9.10-P1, 9.10.0->9.10.5-P1, 9.11.0->9.11.1-P1, 9.9.3-S1->9.9.10-S2, 9.10.5-S1->9.10.5-S2.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

isc bind 9.10.5

isc bind 9.9.3

isc bind 9.9.0

isc bind

isc bind 9.11.1

isc bind 9.9.10

redhat enterprise linux server 7.0

redhat enterprise linux workstation 7.0

redhat enterprise linux server aus 7.6

redhat enterprise linux server eus 7.4

redhat enterprise linux server eus 7.5

redhat enterprise linux server eus 7.6

redhat enterprise linux server aus 7.3

redhat enterprise linux server tus 7.3

redhat enterprise linux server tus 7.6

redhat enterprise linux server 6.0

redhat enterprise linux desktop 6.0

redhat enterprise linux workstation 6.0

redhat enterprise linux desktop 7.0

redhat enterprise linux server eus 7.3

redhat enterprise linux server aus 7.4

debian debian linux 8.0

debian debian linux 9.0

Vendor Advisories

Synopsis Important: bind security and bug fix update Type/Severity Security Advisory: Important Topic An update for bind is now available for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) base ...
Synopsis Important: bind security and bug fix update Type/Severity Security Advisory: Important Topic An update for bind is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) base ...
Debian Bug report logs - #866564 bind9: CVE-2017-3142 CVE-2017-3143 Package: src:bind9; Maintainer for src:bind9 is Debian DNS Team <team+dns@trackerdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 30 Jun 2017 04:21:01 UTC Severity: grave Tags: patch, security, upstream Found in version ...
Clément Berthaux from Synaktiv discovered two vulnerabilities in BIND, a DNS server implementation They allow an attacker to bypass TSIG authentication by sending crafted DNS packets to a server CVE-2017-3142 An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key nam ...
Bind could be made to serve incorrect information or expose sensitive information over the network ...
Bind could be made to serve incorrect information or expose sensitive information over the network ...
USN-3346-1 introduced a regression in Bind ...
Security Fix(es): A flaw was found in the way BIND handled TSIG authentication for dynamic updates A remote attacker able to communicate with an authoritative BIND server could use this flaw to manipulate the contents of a zone, by forging a valid TSIG or SIG(0) signature for a dynamic update request A flaw was found in the way BIND handled TSIG ...
A flaw was found in the way BIND handled TSIG authentication for dynamic updates A remote attacker able to communicate with an authoritative BIND server could use this flaw to manipulate the contents of a zone, by forging a valid TSIG or SIG(0) signature for a dynamic update request ...
An error in TSIG authentication has been found in Bind <= 9111-P1, allowing a remote attacker to bypass authentication in order to perform unauthorized zone updates, altering the content of the zone The attacker needs to have knowledge of the key name, and should be allowed by the other ACL restrictions if any ...

Github Repositories

πŸ¦„ A curated list of the awesome resources about the Vulnerability Research

Awesome Vulnerability Research πŸ¦„ A curated list of the awesome resources about the Vulnerability Research First things first: There are no exploits in this project Vulnerabilities != Exploits A Vulnerability resides in the software itself, doing nothing on its own If you are really curious about then you’ll find your own way to discover a flow, this list aimed to h

Awesome Vulnerability Research πŸ¦„ A curated list of the awesome resources about the Vulnerability Research First things first: There are no exploits in this project Vulnerabilities != Exploits A Vulnerability resides in the software itself, doing nothing on its own If you are really curious about then you’ll find your own way to discover a flow, this list aimed to h

πŸ¦„ A curated list of the awesome resources about the Vulnerability Research

Awesome Vulnerability Research πŸ¦„ A curated list of the awesome resources about the Vulnerability Research First things first: There are no exploits in this project Vulnerabilities != Exploits A Vulnerability resides in the software itself, doing nothing on its own If you are really curious about then you’ll find your own way to discover a flow, this list aimed to h

Exploit for TSIG bypass vulnerabilities in Bind (CVE-2017-3143) and Knot DNS (CVE-2017-11104)

TSIG Bypass exploit Exploit for CVE-2017-3143 in Bind and CVE-2017-11104 in Knot DNS See wwwsynacktivcom/ressources/CVE-2017-3143_BIND9_TSIG_dynamic_updates_vulnerability_Synacktivpdf for more info Author Clément Berthaux - clement (dot) berthaux (at) synacktiv (dot) com

πŸ¦„ A curated list of the awesome resources about the Vulnerability Research

Awesome Vulnerability Research πŸ¦„ A curated list of the awesome resources about the Vulnerability Research First things first: There are no exploits in this project Vulnerabilities != Exploits A Vulnerability resides in the software itself, doing nothing on its own If you are really curious about then you’ll find your own way to discover a flow, this list aimed to h

A curated list of my GitHub stars!

Awesome Stars A curated list of my GitHub stars! Generated by starred Contents ASL Assembly AutoHotkey Batchfile C C# C++ CMake CSS Clojure CoffeeScript Dockerfile F# Go Groovy HTML Haskell Java JavaScript Jupyter Notebook Kotlin Logos Lua Makefile Objective-C Objective-C++ Others PHP Pascal Perl PowerShell Prolog Python Rascal Roff Ruby Rust Scala Shell Swift TSQL TeX Typ

Awesome Vulnerability Research πŸ¦„ A curated list of the awesome resources about the Vulnerability Research First things first: There are no exploits in this project Vulnerabilities != Exploits A Vulnerability resides in the software itself, doing nothing on its own If you are really curious about then you’ll find your own way to discover a flow, this list aimed to h