BIND was improperly sequencing cleanup operations on upstream recursion fetch contexts, leading in some cases to a use-after-free error that can trigger an assertion failure and crash in named. Affects BIND 9.0.0 to 9.8.x, 9.9.0 to 9.9.11, 9.10.0 to 9.10.6, 9.11.0 to 9.11.2, 9.9.3-S1 to 9.9.11-S1, 9.10.5-S1 to 9.10.6-S1, 9.12.0a1 to 9.12.0rc1.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
AND |
|
History
21 Nov 2024, 03:24
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/102716 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1040195 - Broken Link, Third Party Advisory, VDB Entry | |
References | () https://access.redhat.com/errata/RHSA-2018:0101 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:0102 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:0487 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:0488 - Third Party Advisory | |
References | () https://kb.isc.org/docs/aa-01542 - Vendor Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2018/01/msg00029.html - Mailing List, Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20180117-0003/ - Third Party Advisory | |
References | () https://supportportal.juniper.net/s/article/2018-07-Security-Bulletin-SRX-Series-Vulnerabilities-in-ISC-BIND-named - Third Party Advisory | |
References | () https://www.debian.org/security/2018/dsa-4089 - Third Party Advisory |
21 Jun 2023, 18:19
Type | Values Removed | Values Added |
---|---|---|
First Time |
Juniper srx220
Juniper srx650 Juniper srx4000 Juniper srx300 Juniper junos Juniper srx345 Juniper srx3600 Juniper srx210 Juniper srx1400 Juniper srx5000 Juniper srx550 Hm Juniper srx1500 Juniper srx380 Juniper srx110 Juniper srx4100 Juniper srx100 Juniper srx5600 Juniper srx340 Juniper srx550m Juniper srx550 Juniper srx240m Juniper srx4600 Juniper srx4200 Juniper srx5800 Juniper srx5400 Juniper srx320 Juniper srx240 Juniper Juniper srx240h2 Juniper srx3400 |
|
References | (BID) http://www.securityfocus.com/bid/102716 - Broken Link, Third Party Advisory, VDB Entry | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2018/01/msg00029.html - Mailing List, Third Party Advisory | |
References | (SECTRACK) http://www.securitytracker.com/id/1040195 - Broken Link, Third Party Advisory, VDB Entry | |
References | (MISC) https://supportportal.juniper.net/s/article/2018-07-Security-Bulletin-SRX-Series-Vulnerabilities-in-ISC-BIND-named - Third Party Advisory | |
CPE | cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:15.1x49-d140:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos:12.3x48-d70:-:*:*:*:*:*:* cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:18.2r1:-:*:*:*:*:*:* cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:12.1x46-d76:-:*:*:*:*:*:* cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:17.4r2:-:*:*:*:*:*:* cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:18.1r2:-:*:*:*:*:*:* cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:* |
16 Jun 2023, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2019-01-16 20:29
Updated : 2024-11-21 03:24
NVD link : CVE-2017-3145
Mitre link : CVE-2017-3145
CVE.ORG link : CVE-2017-3145
JSON object : View
Products Affected
debian
- debian_linux
juniper
- srx5400
- srx4600
- srx4200
- junos
- srx300
- srx240h2
- srx5800
- srx5600
- srx240
- srx210
- srx5000
- srx220
- srx110
- srx1400
- srx240m
- srx320
- srx4000
- srx345
- srx650
- srx3600
- srx1500
- srx4100
- srx340
- srx3400
- srx100
- srx550m
- srx380
- srx550_hm
- srx550
redhat
- enterprise_linux_server_tus
- enterprise_linux_server_aus
- enterprise_linux_server_eus
- enterprise_linux_desktop
- enterprise_linux_workstation
- enterprise_linux_server
isc
- bind
netapp
- data_ontap_edge
CWE
CWE-416
Use After Free