Vulnerability Details : CVE-2017-3145
BIND was improperly sequencing cleanup operations on upstream recursion fetch contexts, leading in some cases to a use-after-free error that can trigger an assertion failure and crash in named. Affects BIND 9.0.0 to 9.8.x, 9.9.0 to 9.9.11, 9.10.0 to 9.10.6, 9.11.0 to 9.11.2, 9.9.3-S1 to 9.9.11-S1, 9.10.5-S1 to 9.10.6-S1, 9.12.0a1 to 9.12.0rc1.
Vulnerability category: Memory Corruption
Products affected by CVE-2017-3145
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.12.0:b1:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.12.0:b2:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.12.0:alpha1:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.10.5:s1:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.9.11:s1:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.9.3:s1:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.12.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.10.6:s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:12.1x46-d76:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:12.3x48-d70:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:15.1x49-d140:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4r2:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.1r2:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.2r1:-:*:*:*:*:*:*
- cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
Threat overview for CVE-2017-3145
Top countries where our scanners detected CVE-2017-3145
Top open port discovered on systems with this issue
53
IPs affected by CVE-2017-3145 323,444
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2017-3145!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2017-3145
8.98%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 95 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-3145
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST | |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
Internet Systems Consortium (ISC) | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2017-3145
-
The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-3145
-
https://supportportal.juniper.net/s/article/2018-07-Security-Bulletin-SRX-Series-Vulnerabilities-in-ISC-BIND-named
2018-07 Security Bulletin: SRX Series: Vulnerabilities in ISC BIND namedThird Party Advisory
-
https://lists.debian.org/debian-lts-announce/2018/01/msg00029.html
[SECURITY] [DLA 1255-1] bind9 security updateMailing List;Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:0102
RHSA-2018:0102 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://kb.isc.org/docs/aa-01542
CVE-2017-3145: Improper fetch cleanup sequencing in the resolver can cause named to crash - Security AdvisoriesVendor Advisory
-
https://access.redhat.com/errata/RHSA-2018:0101
RHSA-2018:0101 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://www.debian.org/security/2018/dsa-4089
Debian -- Security Information -- DSA-4089-1 bind9Third Party Advisory
-
https://security.netapp.com/advisory/ntap-20180117-0003/
CVE-2017-3145 ISC BIND Vulnerability in NetApp Products | NetApp Product SecurityThird Party Advisory
-
http://www.securityfocus.com/bid/102716
ISC BIND CVE-2017-3145 Remote Denial of Service VulnerabilityBroken Link;Third Party Advisory;VDB Entry
-
http://www.securitytracker.com/id/1040195
BIND Recursion Processing Error in 'netaddr.c' Lets Remote Users Cause the Target 'named' Service to Crash - SecurityTrackerBroken Link;Third Party Advisory;VDB Entry
-
https://access.redhat.com/errata/RHSA-2018:0488
RHSA-2018:0488 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:0487
RHSA-2018:0487 - Security Advisory - Red Hat Customer PortalThird Party Advisory
Jump to