BIND was improperly sequencing cleanup operations on upstream recursion fetch contexts, leading in some cases to a use-after-free error that can trigger an assertion failure and crash in named. Affects BIND 9.0.0 to 9.8.x, 9.9.0 to 9.9.11, 9.10.0 to 9.10.6, 9.11.0 to 9.11.2, 9.9.3-S1 to 9.9.11-S1, 9.10.5-S1 to 9.10.6-S1, 9.12.0a1 to 9.12.0rc1.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
AND |
|
History
No history.
Information
Published : 2019-01-16 20:29
Updated : 2024-11-21 03:24
NVD link : CVE-2017-3145
Mitre link : CVE-2017-3145
CVE.ORG link : CVE-2017-3145
JSON object : View
Products Affected
redhat
- enterprise_linux_workstation
- enterprise_linux_server_aus
- enterprise_linux_server_tus
- enterprise_linux_desktop
- enterprise_linux_server
- enterprise_linux_server_eus
juniper
- srx240
- srx300
- srx4100
- srx5400
- srx345
- junos
- srx550
- srx320
- srx1400
- srx5600
- srx3400
- srx5000
- srx550_hm
- srx4600
- srx240h2
- srx4200
- srx220
- srx1500
- srx550m
- srx4000
- srx210
- srx650
- srx5800
- srx340
- srx110
- srx380
- srx240m
- srx100
- srx3600
netapp
- data_ontap_edge
isc
- bind
debian
- debian_linux
CWE
CWE-416
Use After Free