An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name may be able to circumvent TSIG authentication of AXFR requests via a carefully constructed request packet. A server that relies solely on TSIG keys for protection with no other ACL protection could be manipulated into: providing an AXFR of a zone to an unauthorized recipient or accepting bogus NOTIFY packets. Affects BIND 9.4.0->9.8.8, 9.9.0->9.9.10-P1, 9.10.0->9.10.5-P1, 9.11.0->9.11.1-P1, 9.9.3-S1->9.9.10-S2, 9.10.5-S1->9.10.5-S2.
{
"unresolved_ranges": [
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "7.0"
}
]
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "7.0"
}
]
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "7.3"
}
]
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "7.4"
}
]
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "7.6"
}
]
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "7.3"
}
]
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "7.4"
}
]
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "7.6"
}
]
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "7.3"
}
]
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "7.6"
}
]
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "7.0"
}
]
}
]
}{
"cpe": [
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
],
"source": "CPE_FIELD",
"extracted_events": [
{
"introduced": "0"
},
{
"last_affected": "6.0"
},
{
"last_affected": "7.5"
},
{
"last_affected": "8.0"
}
]
}{
"cpe": [
"cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.0:p1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.3:s1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.10:s2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.10.5:p1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.10.5:s1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.10.5:s2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.11.1:p1:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
],
"source": "CPE_FIELD",
"extracted_events": [
{
"introduced": "9.4.0"
},
{
"last_affected": "9.8.8"
},
{
"introduced": "9.9.0"
},
{
"last_affected": "9.9.10"
},
{
"introduced": "9.10.0"
},
{
"last_affected": "9.10.5"
},
{
"introduced": "9.11.0"
},
{
"last_affected": "9.11.1"
},
{
"introduced": "0"
},
{
"last_affected": "9.9.0-p1"
},
{
"last_affected": "9.9.3-s1"
},
{
"last_affected": "9.9.10-s2"
},
{
"last_affected": "9.10.5-p1"
},
{
"last_affected": "9.10.5-s1"
},
{
"last_affected": "9.10.5-s2"
},
{
"last_affected": "9.11.1-p1"
},
{
"last_affected": "9.0"
}
]
}