Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-957-1 | bind9 security update |
Debian DSA |
DSA-3854-1 | bind9 security update |
Ubuntu USN |
USN-3259-1 | Bind vulnerabilities |
Solution
Upgrade to the patched release most closely related to your current version of BIND. These can all be downloaded from http://www.isc.org/downloads. BIND 9 version 9.9.9-P8 BIND 9 version 9.10.4-P8 BIND 9 version 9.11.0-P5 BIND Supported Preview Edition is a special feature preview branch of BIND provided to eligible ISC support customers. BIND 9 version 9.9.9-S10 New maintenance releases of BIND are also scheduled which contain the fix for this vulnerability. In addition to the security releases listed above, fixes for this vulnerability are also included in these release candidate versions: BIND 9 version 9.9.10rc3 BIND 9 version 9.10.5rc3 BIND 9 version 9.11.1rc3
Workaround
Servers which have configurations which require DNS64 and "break-dnssec yes;" should upgrade. Servers which are not using these features in conjunction are not at risk from this defect.
No history.
Status: PUBLISHED
Assigner: isc
Published:
Updated: 2024-09-17T00:51:35.181Z
Reserved: 2016-12-02T00:00:00
Link: CVE-2017-3136
No data.
Status : Modified
Published: 2019-01-16T20:29:00.313
Modified: 2024-11-21T03:24:54.430
Link: CVE-2017-3136
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN