Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
DLA-1025-1 | bind9 security update |
![]() |
DSA-3904-1 | bind9 security update |
![]() |
USN-3346-1 | bind9 vulnerabilities |
![]() |
USN-3346-3 | Bind vulnerabilities |
Solution
Upgrade to the patched release most closely related to your current version of BIND. These can all be downloaded from http://www.isc.org/downloads. BIND 9 version 9.9.10-P2 BIND 9 version 9.10.5-P2 BIND 9 version 9.11.1-P2 BIND Supported Preview Edition is a special feature preview branch of BIND provided to eligible ISC support customers. BIND 9 version 9.9.10-S3 BIND 9 version 9.10.5-S3
Workaround
The effects of this vulnerability can be mitigated by using Access Control Lists (ACLs) that require both address range validation and use of TSIG authentication in conjunction. For information on how to configure this type of compound authentication control, please see: https://kb.isc.org/article/AA-00723/0/Using-Access-Control-Lists-ACLs-with-both-addresses-and-keys.html. Administrators who have made use of named.conf option "update-policy local;" should patch their servers as soon as possible and if this is not possible should replace the update-policy configuration statement with an allow-update statement implementing the key requirement for updates but additionally imposing an IP ACL limitation, e.g.: allow-update { !{ !localhost; }; key local-ddns; };
No history.

Status: PUBLISHED
Assigner: isc
Published:
Updated: 2024-09-16T16:14:21.796Z
Reserved: 2016-12-02T00:00:00
Link: CVE-2017-3143

No data.

Status : Modified
Published: 2019-01-16T20:29:00.580
Modified: 2024-11-21T03:24:55.427
Link: CVE-2017-3143


No data.