Learn about CVE-2017-3143, a high severity vulnerability in BIND affecting various versions. Find out the impact, affected systems, exploitation mechanism, and mitigation steps.
Understanding CVE-2017-3143
What is CVE-2017-3143?
A potential attacker with the ability to send and receive messages to a DNS server that has authority over a specific zone and service, and possessing knowledge of a valid TSIG key name, may be capable of manipulating BIND to accept an unauthorized dynamic update. This vulnerability affects various versions of BIND.
The Impact of CVE-2017-3143
This vulnerability has a CVSS base score of 7.5, indicating a high severity issue with a low attack complexity. It can lead to unauthorized dynamic updates in affected BIND versions.
Technical Details of CVE-2017-3143
Vulnerability Description
An attacker exploiting this vulnerability can manipulate BIND into accepting unauthorized dynamic updates by leveraging a valid TSIG key name for the targeted zone and service.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability can be exploited by an attacker who can communicate with an authoritative DNS server and possesses knowledge of a valid TSIG key name for the targeted zone and service.
Mitigation and Prevention
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Upgrade to the following patched releases:
For BIND Supported Preview Edition users: