CVE-2017-3136

Source
https://nvd.nist.gov/vuln/detail/CVE-2017-3136
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-3136.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2017-3136
Downstream
Related
Published
2019-01-16T20:29:00Z
Modified
2025-10-07T23:14:35.299972Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

A query with a specific set of characteristics could cause a server using DNS64 to encounter an assertion failure and terminate. An attacker could deliberately construct a query, enabling denial-of-service against a server if it was configured to use the DNS64 feature and other preconditions were met. Affects BIND 9.8.0 -> 9.8.8-P1, 9.9.0 -> 9.9.9-P6, 9.9.10b1->9.9.10rc1, 9.10.0 -> 9.10.4-P6, 9.10.5b1->9.10.5rc1, 9.11.0 -> 9.11.0-P3, 9.11.1b1->9.11.1rc1, 9.9.3-S1 -> 9.9.9-S8.

References

Affected packages

Git / gitlab.isc.org/isc-projects/bind9

Affected versions

v9.*

v9.8.0
v9.8.1b1
v9.8.1rc1
v9.8.2b1
v9.8.2rc1
v9.8.2rc2
v9.8.3
v9.8.4b1
v9.8.4rc1
v9.8.5
v9.8.5b1
v9.8.5b2
v9.8.5rc1
v9.8.5rc2
v9.8.6
v9.8.6b1
v9.8.6rc1
v9.8.6rc2
v9.8.7
v9.8.7b1
v9.8.7rc1
v9.8.7rc2
v9.8.8
v9.8.8b1
v9.8.8b2
v9.8.8rc1
v9.8.8rc2
v9.9.0
v9.9.1
v9.9.2b1
v9.9.2rc1
v9.9.3b1