Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1025-1 | bind9 security update |
Debian DSA |
DSA-3904-1 | bind9 security update |
Ubuntu USN |
USN-3346-1 | bind9 vulnerabilities |
Ubuntu USN |
USN-3346-3 | Bind vulnerabilities |
Solution
Upgrade to the patched release most closely related to your current version of BIND. These can all be downloaded from http://www.isc.org/downloads. BIND 9 version 9.9.10-P2 BIND 9 version 9.10.5-P2 BIND 9 version 9.11.1-P2 BIND Supported Preview Edition is a special feature preview branch of BIND provided to eligible ISC support customers. BIND 9 version 9.9.10-S3 BIND 9 version 9.10.5-S3
Workaround
The effects of this vulnerability can be mitigated by using Access Control Lists (ACLs) that require both address range validation and use of TSIG authentication in conjunction. For information on how to configure this type of compound authentication control, please see: https://kb.isc.org/article/AA-00723/0/Using-Access-Control-Lists-ACLs-with-both-addresses-and-keys.html. Administrators who have made use of named.conf option "update-policy local;" should patch their servers as soon as possible and if this is not possible should replace the update-policy configuration statement with an allow-update statement implementing the key requirement for updates but additionally imposing an IP ACL limitation, e.g.: allow-update { !{ !localhost; }; key local-ddns; };
No history.
Status: PUBLISHED
Assigner: isc
Published:
Updated: 2024-09-16T16:14:21.796Z
Reserved: 2016-12-02T00:00:00
Link: CVE-2017-3143
No data.
Status : Modified
Published: 2019-01-16T20:29:00.580
Modified: 2024-11-21T03:24:55.427
Link: CVE-2017-3143
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN