Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
DLA-957-1 | bind9 security update |
![]() |
DSA-3854-1 | bind9 security update |
![]() |
USN-3259-1 | Bind vulnerabilities |
Solution
Upgrade to the patched release most closely related to your current version of BIND. These can all be downloaded from http://www.isc.org/downloads. BIND 9 version 9.9.9-P8 BIND 9 version 9.10.4-P8 BIND 9 version 9.11.0-P5 BIND Supported Preview Edition is a special feature preview branch of BIND provided to eligible ISC support customers. BIND 9 version 9.9.9-S10 New maintenance releases of BIND are also scheduled which contain the fix for this vulnerability. In addition to the security releases listed above, fixes for this vulnerability are also included in these release candidate versions: BIND 9 version 9.9.10rc3 BIND 9 version 9.10.5rc3 BIND 9 version 9.11.1rc3
Workaround
Servers which have configurations which require DNS64 and "break-dnssec yes;" should upgrade. Servers which are not using these features in conjunction are not at risk from this defect.
No history.

Status: PUBLISHED
Assigner: isc
Published:
Updated: 2024-09-17T00:51:35.181Z
Reserved: 2016-12-02T00:00:00
Link: CVE-2017-3136

No data.

Status : Modified
Published: 2019-01-16T20:29:00.313
Modified: 2024-11-21T03:24:54.430
Link: CVE-2017-3136


No data.