{"id":"CVE-2017-3145","details":"BIND was improperly sequencing cleanup operations on upstream recursion fetch contexts, leading in some cases to a use-after-free error that can trigger an assertion failure and crash in named. Affects BIND 9.0.0 to 9.8.x, 9.9.0 to 9.9.11, 9.10.0 to 9.10.6, 9.11.0 to 9.11.2, 9.9.3-S1 to 9.9.11-S1, 9.10.5-S1 to 9.10.6-S1, 9.12.0a1 to 9.12.0rc1.","modified":"2026-04-16T01:42:12.263050418Z","published":"2019-01-16T20:29:00.690Z","related":["CGA-cq37-c6xj-rm4v","SUSE-SU-2018:0303-1","SUSE-SU-2018:0362-1","openSUSE-SU-2024:10650-1"],"database_specific":{"unresolved_ranges":[{"extracted_events":[{"last_affected":"9.12.0-alpha1"}],"cpe":"cpe:2.3:a:isc:bind:9.12.0:alpha1:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"7.0"}],"cpe":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"12.1x46-d76-NA"}],"cpe":"cpe:2.3:o:juniper:junos:12.1x46-d76:-:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"12.3x48-d70-NA"}],"cpe":"cpe:2.3:o:juniper:junos:12.3x48-d70:-:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"15.1x49-d140-NA"}],"cpe":"cpe:2.3:o:juniper:junos:15.1x49-d140:-:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"17.4r2-NA"}],"cpe":"cpe:2.3:o:juniper:junos:17.4r2:-:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"18.1r2-NA"}],"cpe":"cpe:2.3:o:juniper:junos:18.1r2:-:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"18.2r1-NA"}],"cpe":"cpe:2.3:o:juniper:junos:18.2r1:-:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"7.0"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"7.0"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"6.4"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"6.5"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"6.6"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"7.2"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"7.3"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"7.4"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"7.6"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"6.7"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"7.3"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"7.4"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"7.6"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"6.6"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"7.2"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"7.3"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"7.6"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"7.0"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","source":"CPE_FIELD"}]},"references":[{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/102716"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1040195"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:0101"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:0102"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:0487"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:0488"},{"type":"ADVISORY","url":"https://kb.isc.org/docs/aa-01542"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/01/msg00029.html"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20180117-0003/"},{"type":"ADVISORY","url":"https://supportportal.juniper.net/s/article/2018-07-Security-Bulletin-SRX-Series-Vulnerabilities-in-ISC-BIND-named"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4089"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/isc-projects/bind9","events":[{"introduced":"0"},{"last_affected":"6d06e7e7e585e30b419e4e20815cb8233c48f7b1"},{"last_affected":"d7e5f7903de06e504aac4a3822a41d69e159e370"},{"last_affected":"f8a0c0bed6ed629e314d22619510939c61d88b0e"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"last_affected":"6.0"},{"last_affected":"7.5"},{"last_affected":"8.0"}],"cpe":["cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"],"source":"CPE_FIELD"}}],"versions":["ondrej/008bfb6249a5f81d9e02ad4d39fda63fab57a0ad","ondrej/00ce93a69cd809810b82dbb229abf59d8e5850cc","ondrej/067f87f158b633e18a9c6fd0b038d1dc288bcb74","ondrej/074c7cc12c0eda40441926a8a96631c3176824a9","ondrej/1a1413ff5910ace7919bb8db0a1bb1f6e9c9ff7d","ondrej/2438db2eae8baf084615aff3b210ea51cd2f1fe1","ondrej/4098157e6ce98910ff99c58c41c6cf8069b79cc7","ondrej/4281aaab4503116fcf50caa348e1b5e7d414b742","ondrej/42e84e4b97be23f2b3754844e9d4478f48e92b48","ondrej/46caf5f4a4522d42480aee4d5949ea9546f98c2f","ondrej/4d292fc37ff5e99462756352c6028af7d0becf74","ondrej/4f369af51ede0e5ac7b3a14c451c5a41350a61cc","ondrej/53738634c3b511bd78e6626df95ae140631b080c","ondrej/6d06e7e7e585e30b419e4e20815cb8233c48f7b1","ondrej/6d1fdb850516a8d1fbfa853c56a1ef7627d54a72","ondrej/761b47a64845cb647d4fa3362be538eb0e7174d9","ondrej/840e56a979c3719ded668d5aaa04b1bddce465ef","ondrej/9cd2880a82f627bc44ab65fdaa19c2bcd9e61c96","ondrej/a42afbce2e34a5f990517fee7eab013c4adb8c0a","ondrej/a5f554959ec531712f6e14a8cb8c90d87cc27932","ondrej/b177581bb230d89821d1e2e5e91f93bee3fc4192","ondrej/b6298b394e9eaefcfa2458cd56c345d778e99b8e","ondrej/be1e6499742e241d71c7e79434e278a0c89d141b","ondrej/c63b7fad498dbe56710b655bd296a58abba64bb8","ondrej/d7e5f7903de06e504aac4a3822a41d69e159e370","ondrej/e00b13ac6e5a49434fbe534b0cab86b9ee4fbdb5","ondrej/f8a0c0bed6ed629e314d22619510939c61d88b0e","ondrej/fb07c38697c9f4f76dcb921487c4f96813c99b69","v9.10.0a1","v9.10.0a2","v9.10.0b1","v9.10.0b2","v9.10.0rc1","v9.11.0a1","v9.11.0a2","v9.11.0a3","v9.12.0a1","v9.12.0b1","v9.12.0b2","v9.12.0rc1","v9.13.0","v9.13.2","v9.13.3","v9.13.4","v9.13.5","v9.13.6","v9.15.0","v9.15.2","v9.15.3","v9.15.4","v9.15.7","v9.15.8","v9.19.0","v9.5.0a1","v9.5.0a2","v9.5.0a3","v9.5.0a4","v9.5.0a5","v9.5.0a6","v9.7.0a1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-3145.json"}},{"ranges":[{"type":"GIT","repo":"https://gitlab.isc.org/isc-projects/bind9","events":[{"introduced":"600305bf9b2e7ab79b95989190f84fdcf4140cc1"},{"last_affected":"8fc2e36186691698d247ab040b83793a9189de73"},{"introduced":"3514c49b2fbcdf95b2735878e2487fce9a3ddad5"},{"last_affected":"efa5130b2313f4ecfbd7283979f7fe34396c3d00"},{"introduced":"63fbb3ea39094353765c04a6066b9e1d1013992a"},{"last_affected":"9d1ea0b7feb9407baddf36c550b1c1f274d13baa"},{"introduced":"1477c19dd9a347ee19a42dac227f299a4680506f"},{"last_affected":"0a2b929f15e00f35e0f0b49d862a2bb9b6be024e"},{"introduced":"0"},{"last_affected":"1c59cea1c0e26e2da3f2afb90200bfe9f7748c03"},{"last_affected":"3765187b5ff04cc791b027c1411378a424e10fdc"},{"last_affected":"341e64a2de908ceec50ed46d243bf3402342735c"},{"last_affected":"2c00a11db3e577fefce3c5d384db99a924bf518b"},{"last_affected":"08a3dedda1254acbbc7ebbfee33915d27efaa902"},{"last_affected":"5b1e929b8b07586a24d32dc0d7590bc25dacf754"},{"last_affected":"f9c3aba9b3070603bd8582399646480ec6bc5912"},{"last_affected":"19d6c56085e97cf4ac559cdc27edd624127bcb32"}],"database_specific":{"extracted_events":[{"introduced":"9.4.0"},{"last_affected":"9.8.8"},{"introduced":"9.9.0"},{"last_affected":"9.9.11"},{"introduced":"9.10.0"},{"last_affected":"9.10.6"},{"introduced":"9.11.0"},{"last_affected":"9.11.2"},{"introduced":"0"},{"last_affected":"9.9.3-s1"},{"last_affected":"9.9.11-s1"},{"last_affected":"9.10.5-s1"},{"last_affected":"9.10.6-s1"},{"last_affected":"9.12.0-b1"},{"last_affected":"9.12.0-b2"},{"last_affected":"9.12.0-rc1"},{"last_affected":"9.0"}],"cpe":["cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.9.3:s1:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.9.11:s1:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.10.5:s1:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.10.6:s1:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.12.0:b1:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.12.0:b2:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.12.0:rc1:*:*:*:*:*:*","cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"],"source":"CPE_FIELD"}}],"versions":["v9.0.0","v9.10.0a1","v9.10.0a2","v9.10.0b1","v9.10.0b2","v9.10.0rc1","v9.10.0rc2","v9.10.1","v9.10.1b1","v9.10.1b2","v9.10.1rc1","v9.10.1rc2","v9.10.2","v9.10.2b1","v9.10.2rc1","v9.10.2rc2","v9.10.3","v9.10.3b1","v9.10.3rc1","v9.10.4","v9.10.4b1","v9.10.4b2","v9.10.4b3","v9.10.4rc1","v9.10.5","v9.10.5b1","v9.10.5rc1","v9.10.5rc2","v9.10.5rc3","v9.10.6","v9.10.6b1","v9.10.6rc1","v9.10.6rc2","v9.11.0","v9.11.0a1","v9.11.0a2","v9.11.0a3","v9.11.1","v9.11.1b1","v9.11.1rc1","v9.11.1rc2","v9.11.1rc3","v9.11.2","v9.11.2b1","v9.11.2rc1","v9.11.2rc2","v9.12.0a1","v9.12.0b1","v9.12.0b2","v9.12.0rc1","v9.5.0a1","v9.5.0a2","v9.5.0a3","v9.5.0a4","v9.5.0a5","v9.5.0a6","v9.7.0a1","v9.8.0","v9.8.0rc1","v9.8.1b1","v9.8.1rc1","v9.8.2b1","v9.8.2rc1","v9.8.2rc2","v9.8.4b1","v9.8.4rc1","v9.8.5","v9.8.5b1","v9.8.5b2","v9.8.5rc1","v9.8.5rc2","v9.8.6","v9.8.6b1","v9.8.6rc1","v9.8.6rc2","v9.8.7","v9.8.7b1","v9.8.7rc1","v9.8.7rc2","v9.8.8","v9.8.8b1","v9.8.8b2","v9.8.8rc1","v9.8.8rc2","v9.9.0","v9.9.1","v9.9.10","v9.9.10b1","v9.9.10rc1","v9.9.10rc2","v9.9.10rc3","v9.9.11","v9.9.11b1","v9.9.11rc1","v9.9.11rc2","v9.9.2b1","v9.9.2rc1","v9.9.3","v9.9.3b1","v9.9.3b2","v9.9.3rc1","v9.9.3rc2","v9.9.4","v9.9.4b1","v9.9.4rc2","v9.9.5","v9.9.5b1","v9.9.5rc1","v9.9.5rc2","v9.9.6","v9.9.6b1","v9.9.6b2","v9.9.6rc1","v9.9.6rc2","v9.9.7","v9.9.7b1","v9.9.7rc1","v9.9.7rc2","v9.9.8","v9.9.8b1","v9.9.8rc1","v9.9.9","v9.9.9b1","v9.9.9b2","v9.9.9rc1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-3145.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}