{"id":"CVE-2017-3143","details":"An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name for the zone and service being targeted may be able to manipulate BIND into accepting an unauthorized dynamic update. Affects BIND 9.4.0-\u003e9.8.8, 9.9.0-\u003e9.9.10-P1, 9.10.0-\u003e9.10.5-P1, 9.11.0-\u003e9.11.1-P1, 9.9.3-S1-\u003e9.9.10-S2, 9.10.5-S1-\u003e9.10.5-S2.","modified":"2026-05-18T05:49:34.688933070Z","published":"2019-01-16T20:29:00.580Z","related":["SUSE-SU-2017:1736-1","SUSE-SU-2017:1737-1","SUSE-SU-2017:1738-1"],"database_specific":{"unresolved_ranges":[{"vendor_product":"debian:debian_linux","extracted_events":[{"last_affected":"8.0"},{"last_affected":"9.0"}],"cpes":["cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"],"source":"CPE_FIELD"},{"vendor_product":"redhat:enterprise_linux_desktop","extracted_events":[{"last_affected":"6.0"},{"last_affected":"7.0"}],"cpes":["cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"],"source":"CPE_FIELD"},{"vendor_product":"redhat:enterprise_linux_server","extracted_events":[{"last_affected":"6.0"},{"last_affected":"7.0"}],"cpes":["cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"],"source":"CPE_FIELD"},{"vendor_product":"redhat:enterprise_linux_server_aus","extracted_events":[{"last_affected":"7.3"},{"last_affected":"7.4"},{"last_affected":"7.6"}],"cpes":["cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"],"source":"CPE_FIELD"},{"vendor_product":"redhat:enterprise_linux_server_eus","extracted_events":[{"last_affected":"7.3"},{"last_affected":"7.4"},{"last_affected":"7.5"},{"last_affected":"7.6"}],"cpes":["cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*"],"source":"CPE_FIELD"},{"vendor_product":"redhat:enterprise_linux_server_tus","extracted_events":[{"last_affected":"7.3"},{"last_affected":"7.6"}],"cpes":["cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"],"source":"CPE_FIELD"},{"vendor_product":"redhat:enterprise_linux_workstation","extracted_events":[{"last_affected":"6.0"},{"last_affected":"7.0"}],"cpes":["cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"],"source":"CPE_FIELD"}]},"references":[{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/99337"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1038809"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1679"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1680"},{"type":"ADVISORY","url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03772en_us"},{"type":"ADVISORY","url":"https://kb.isc.org/docs/aa-01503"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20190830-0003/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2017/dsa-3904"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/isc-projects/bind9","events":[{"introduced":"600305bf9b2e7ab79b95989190f84fdcf4140cc1"},{"last_affected":"8fc2e36186691698d247ab040b83793a9189de73"},{"introduced":"3514c49b2fbcdf95b2735878e2487fce9a3ddad5"},{"last_affected":"1a7c6f9dc8b32b52a4462ec0a9b8fa40da628546"},{"introduced":"63fbb3ea39094353765c04a6066b9e1d1013992a"},{"last_affected":"feb005b1b94f0493cd69d70a77a30a15b9a62993"},{"introduced":"1477c19dd9a347ee19a42dac227f299a4680506f"},{"last_affected":"e3dc2e7b9941566190fd2691e1c71ce232f9a7c6"},{"introduced":"0"},{"last_affected":"8a2d9ba36c16111ebb3be1a1c61fa0ebc2610c40"},{"last_affected":"1c59cea1c0e26e2da3f2afb90200bfe9f7748c03"},{"last_affected":"733de85889f4f126106ec4389d32d92046a6e1be"},{"last_affected":"341e64a2de908ceec50ed46d243bf3402342735c"},{"last_affected":"a39c587731ff8da751c26592838fbc04d8b62678"},{"last_affected":"e7f06a85359873b4822acac1b87a885310fd6ac2"}],"database_specific":{"extracted_events":[{"introduced":"9.4.0"},{"last_affected":"9.8.8"},{"introduced":"9.9.0"},{"last_affected":"9.9.10"},{"introduced":"9.10.0"},{"last_affected":"9.10.5"},{"introduced":"9.11.0"},{"last_affected":"9.11.1"},{"introduced":"0"},{"last_affected":"9.9.0-p1"},{"last_affected":"9.9.3-s1"},{"last_affected":"9.9.10-s2"},{"last_affected":"9.10.5-p1"},{"last_affected":"9.10.5-s1"},{"last_affected":"9.10.5-s2"},{"last_affected":"9.11.1-p1"}],"cpe":["cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.9.0:p1:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.9.3:s1:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.9.10:s2:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.10.5:p1:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.10.5:s1:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.10.5:s2:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.11.1:p1:*:*:*:*:*:*"],"source":"CPE_FIELD"}}],"versions":["v9.10.5-P2","v9.9.10-P2","v9.9.10-P1","v9.10.5-P1","v9.9.10","v9.10.5","v9.11.1","v9.9.10rc3","v9.10.5rc3","v9.11.1rc3","v9.9.10rc2","v9.10.5rc2","v9.11.1rc2","v9.9.10rc1","v9.10.5rc1","v9.11.1rc1","v9.9.10b1","v9.11.1b1","v9.10.5b1","v9.11.0","v9.9.9","v9.10.4","v9.9.9rc1","v9.10.4rc1","v9.9.9b2","v9.10.4b3","v9.10.4b2","v9.9.9b1","v9.10.4b1","v9.9.8","v9.10.3","v9.9.8rc1","v9.10.3rc1","v9.9.8b1","v9.10.3b1","v9.9.7","v9.10.2","v9.9.7rc2","v9.10.2rc2","v9.9.7rc1","v9.10.2rc1","v9.10.2b1","v9.9.7b1","v9.9.6","v9.10.1","v9.8.8","v9.8.8rc2","v9.9.6rc2","v9.10.1rc2","v9.9.6rc1","v9.8.8rc1","v9.10.1rc1","v9.8.8b2","v9.9.6b2","v9.10.1b2","v9.9.6b1","v9.10.1b1","v9.8.8b1","v9.10.0rc2","v9.10.0rc1","v9.10.0b2","v9.10.0b1","v9.10.0a2","v9.8.7","v9.9.5","v9.9.5rc2","v9.8.7rc2","v9.9.5rc1","v9.8.7rc1","v9.8.7b1","v9.9.5b1","v9.10.0a1","v9.8.6","v9.9.4","v9.9.4rc2","v9.8.6rc2","v9.8.6rc1","v9.8.6b1","v9.9.4b1","v9.8.5","v9.9.3","v9.8.5rc2","v9.9.3rc2","v9.9.3rc1","v9.8.5rc1","v9.9.3b2","v9.8.5b2","v9.9.3b1","v9.8.5b1","v9.9.2rc1","v9.8.4rc1","v9.8.4b1","v9.9.2b1","v9.9.1","v9.9.0","v9.8.2rc2","v9.8.2rc1","v9.8.2b1","v9.9.0b1","v9.8.1rc1","v9.8.1b1","v9.8.0","v9.8.0rc1","v9.7.0a1","v9.5.0a6","v9.5.0a5","v9.5.0a4","v9.5.0a3","v9.5.0a2","v9.5.0a1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-3143.json"}},{"ranges":[{"type":"GIT","repo":"https://gitlab.isc.org/isc-projects/bind9","events":[{"introduced":"600305bf9b2e7ab79b95989190f84fdcf4140cc1"},{"last_affected":"8fc2e36186691698d247ab040b83793a9189de73"},{"introduced":"3514c49b2fbcdf95b2735878e2487fce9a3ddad5"},{"last_affected":"1a7c6f9dc8b32b52a4462ec0a9b8fa40da628546"},{"introduced":"63fbb3ea39094353765c04a6066b9e1d1013992a"},{"last_affected":"feb005b1b94f0493cd69d70a77a30a15b9a62993"},{"introduced":"1477c19dd9a347ee19a42dac227f299a4680506f"},{"last_affected":"e3dc2e7b9941566190fd2691e1c71ce232f9a7c6"},{"introduced":"0"},{"last_affected":"8a2d9ba36c16111ebb3be1a1c61fa0ebc2610c40"},{"last_affected":"1c59cea1c0e26e2da3f2afb90200bfe9f7748c03"},{"last_affected":"733de85889f4f126106ec4389d32d92046a6e1be"},{"last_affected":"341e64a2de908ceec50ed46d243bf3402342735c"},{"last_affected":"a39c587731ff8da751c26592838fbc04d8b62678"},{"last_affected":"e7f06a85359873b4822acac1b87a885310fd6ac2"}],"database_specific":{"extracted_events":[{"introduced":"9.4.0"},{"last_affected":"9.8.8"},{"introduced":"9.9.0"},{"last_affected":"9.9.10"},{"introduced":"9.10.0"},{"last_affected":"9.10.5"},{"introduced":"9.11.0"},{"last_affected":"9.11.1"},{"introduced":"0"},{"last_affected":"9.9.0-p1"},{"last_affected":"9.9.3-s1"},{"last_affected":"9.9.10-s2"},{"last_affected":"9.10.5-p1"},{"last_affected":"9.10.5-s1"},{"last_affected":"9.10.5-s2"},{"last_affected":"9.11.1-p1"}],"cpe":["cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.9.0:p1:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.9.3:s1:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.9.10:s2:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.10.5:p1:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.10.5:s1:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.10.5:s2:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.11.1:p1:*:*:*:*:*:*"],"source":"CPE_FIELD"}}],"versions":["v9.10.5-P2","v9.9.10-P2","v9.9.10-P1","v9.10.5-P1","v9.9.10","v9.10.5","v9.11.1","v9.9.10rc3","v9.10.5rc3","v9.11.1rc3","v9.9.10rc2","v9.10.5rc2","v9.11.1rc2","v9.9.10rc1","v9.10.5rc1","v9.11.1rc1","v9.9.10b1","v9.11.1b1","v9.10.5b1","v9.11.0","v9.9.9","v9.10.4","v9.9.9rc1","v9.10.4rc1","v9.9.9b2","v9.10.4b3","v9.10.4b2","v9.9.9b1","v9.10.4b1","v9.9.8","v9.10.3","v9.9.8rc1","v9.10.3rc1","v9.9.8b1","v9.10.3b1","v9.9.7","v9.10.2","v9.9.7rc2","v9.10.2rc2","v9.9.7rc1","v9.10.2rc1","v9.10.2b1","v9.9.7b1","v9.9.6","v9.10.1","v9.8.8","v9.8.8rc2","v9.9.6rc2","v9.10.1rc2","v9.9.6rc1","v9.8.8rc1","v9.10.1rc1","v9.8.8b2","v9.9.6b2","v9.10.1b2","v9.9.6b1","v9.10.1b1","v9.8.8b1","v9.10.0rc2","v9.10.0rc1","v9.10.0b2","v9.10.0b1","v9.10.0a2","v9.8.7","v9.9.5","v9.9.5rc2","v9.8.7rc2","v9.9.5rc1","v9.8.7rc1","v9.8.7b1","v9.9.5b1","v9.10.0a1","v9.8.6","v9.9.4","v9.9.4rc2","v9.8.6rc2","v9.8.6rc1","v9.8.6b1","v9.9.4b1","v9.8.5","v9.9.3","v9.8.5rc2","v9.9.3rc2","v9.9.3rc1","v9.8.5rc1","v9.9.3b2","v9.8.5b2","v9.9.3b1","v9.8.5b1","v9.9.2rc1","v9.8.4rc1","v9.8.4b1","v9.9.2b1","v9.9.1","v9.9.0","v9.8.2rc2","v9.8.2rc1","v9.8.2b1","v9.9.0b1","v9.8.1rc1","v9.8.1b1","v9.8.0","v9.8.0rc1","v9.7.0a1","v9.5.0a6","v9.5.0a5","v9.5.0a4","v9.5.0a3","v9.5.0a2","v9.5.0a1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-3143.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}]}