CVE Vulnerabilities

CVE-2017-3135

NULL Pointer Dereference

Published: Jan 16, 2019 | Modified: Nov 21, 2024
CVSS 3.x
5.9
MEDIUM
Source:
NVD
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V2
4.3 MODERATE
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V3
7.5 MODERATE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Under some conditions when using both DNS64 and RPZ to rewrite query responses, query processing can resume in an inconsistent state leading to either an INSIST assertion failure or an attempt to read through a NULL pointer. Affects BIND 9.8.8, 9.9.3-S1 -> 9.9.9-S7, 9.9.3 -> 9.9.9-P5, 9.9.10b1, 9.10.0 -> 9.10.4-P5, 9.10.5b1, 9.11.0 -> 9.11.0-P2, 9.11.1b1.

Weakness

The product dereferences a pointer that it expects to be valid but is NULL.

Affected Software

NameVendorStart VersionEnd Version
BindIsc9.9.3 (including)9.9.3 (including)
BindIsc9.9.3-s1 (including)9.9.3-s1 (including)
BindIsc9.9.8 (including)9.9.8 (including)
BindIsc9.9.9-p5 (including)9.9.9-p5 (including)
BindIsc9.9.9-s7 (including)9.9.9-s7 (including)
BindIsc9.9.10-beta1 (including)9.9.10-beta1 (including)
BindIsc9.10.0 (including)9.10.0 (including)
BindIsc9.10.4-p1 (including)9.10.4-p1 (including)
BindIsc9.10.4-p2 (including)9.10.4-p2 (including)
BindIsc9.10.4-p3 (including)9.10.4-p3 (including)
BindIsc9.10.4-p4 (including)9.10.4-p4 (including)
BindIsc9.10.4-p5 (including)9.10.4-p5 (including)
BindIsc9.10.5-beta1 (including)9.10.5-beta1 (including)
BindIsc9.11.0 (including)9.11.0 (including)
BindIsc9.11.0-p1 (including)9.11.0-p1 (including)
BindIsc9.11.0-p2 (including)9.11.0-p2 (including)
BindIsc9.11.1-beta1 (including)9.11.1-beta1 (including)
Red Hat Enterprise Linux 7RedHatbind-32:9.9.4-38.el7_3.2*
Bind9Ubuntudevel*
Bind9Ubuntuesm-infra-legacy/trusty*
Bind9Ubuntuesm-infra/xenial*
Bind9Ubuntuprecise*
Bind9Ubuntutrusty*
Bind9Ubuntutrusty/esm*
Bind9Ubuntuvivid/stable-phone-overlay*
Bind9Ubuntuvivid/ubuntu-core*
Bind9Ubuntuxenial*
Bind9Ubuntuyakkety*
Bind9Ubuntuzesty*

Potential Mitigations

References