BIND was improperly sequencing cleanup operations on upstream recursion fetch contexts, leading in some cases to a use-after-free error that can trigger an assertion failure and crash in named. Affects BIND 9.0.0 to 9.8.x, 9.9.0 to 9.9.11, 9.10.0 to 9.10.6, 9.11.0 to 9.11.2, 9.9.3-S1 to 9.9.11-S1, 9.10.5-S1 to 9.10.6-S1, 9.12.0a1 to 9.12.0rc1.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
AND |
|
History
21 Nov 2024, 03:24
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/102716 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1040195 - Broken Link, Third Party Advisory, VDB Entry | |
References | () https://access.redhat.com/errata/RHSA-2018:0101 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:0102 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:0487 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:0488 - Third Party Advisory | |
References | () https://kb.isc.org/docs/aa-01542 - Vendor Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2018/01/msg00029.html - Mailing List, Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20180117-0003/ - Third Party Advisory | |
References | () https://supportportal.juniper.net/s/article/2018-07-Security-Bulletin-SRX-Series-Vulnerabilities-in-ISC-BIND-named - Third Party Advisory | |
References | () https://www.debian.org/security/2018/dsa-4089 - Third Party Advisory |
21 Jun 2023, 18:19
Type | Values Removed | Values Added |
---|---|---|
First Time |
Juniper srx240h2
Juniper srx345 Juniper junos Juniper srx550m Juniper srx5800 Juniper srx340 Juniper srx5400 Juniper srx650 Juniper srx300 Juniper srx4600 Juniper srx220 Juniper srx3400 Juniper srx1400 Juniper Juniper srx5000 Juniper srx110 Juniper srx240 Juniper srx100 Juniper srx5600 Juniper srx210 Juniper srx240m Juniper srx4200 Juniper srx380 Juniper srx1500 Juniper srx4000 Juniper srx550 Hm Juniper srx4100 Juniper srx3600 Juniper srx320 Juniper srx550 |
|
References | (MLIST) https://lists.debian.org/debian-lts-announce/2018/01/msg00029.html - Mailing List, Third Party Advisory | |
References | (BID) http://www.securityfocus.com/bid/102716 - Broken Link, Third Party Advisory, VDB Entry | |
References | (SECTRACK) http://www.securitytracker.com/id/1040195 - Broken Link, Third Party Advisory, VDB Entry | |
References | (MISC) https://supportportal.juniper.net/s/article/2018-07-Security-Bulletin-SRX-Series-Vulnerabilities-in-ISC-BIND-named - Third Party Advisory | |
CPE | cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:17.4r2:-:*:*:*:*:*:* cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:15.1x49-d140:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos:18.1r2:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos:18.2r1:-:*:*:*:*:*:* cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:12.3x48-d70:-:*:*:*:*:*:* cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:12.1x46-d76:-:*:*:*:*:*:* cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:* |
16 Jun 2023, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2019-01-16 20:29
Updated : 2024-11-21 03:24
NVD link : CVE-2017-3145
Mitre link : CVE-2017-3145
CVE.ORG link : CVE-2017-3145
JSON object : View
Products Affected
juniper
- srx550m
- srx340
- srx5600
- srx240h2
- srx1500
- srx100
- srx300
- srx4100
- srx4600
- srx210
- srx3600
- srx220
- srx240m
- srx380
- srx650
- srx110
- srx4200
- srx4000
- srx320
- srx550_hm
- srx5800
- srx3400
- srx345
- srx5400
- srx550
- srx1400
- srx5000
- srx240
- junos
redhat
- enterprise_linux_workstation
- enterprise_linux_desktop
- enterprise_linux_server
- enterprise_linux_server_tus
- enterprise_linux_server_aus
- enterprise_linux_server_eus
debian
- debian_linux
isc
- bind
netapp
- data_ontap_edge
CWE
CWE-416
Use After Free