Improper Input Validation Affecting bind package, versions [,9.9.9-P8)[9.10.48, 9.10.4-P8)[9.11.05, 9.11.0-P5)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
10.73% (96th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-BIND-2381988
  • published26 Jan 2022
  • disclosed16 Jan 2019
  • creditUnknown

Introduced: 16 Jan 2019

CVE-2017-3138  (opens in a new tab)
CWE-20  (opens in a new tab)

How to fix?

Upgrade bind to version 9.9.9-P8, 9.10.4-P8, 9.11.0-P5 or higher.

Overview

Affected versions of this package are vulnerable to Improper Input Validation named contains a feature which allows operators to issue commands to a running server by communicating with the server process over a control channel, using a utility program such as rndc. A regression introduced in a recent feature change has created a situation under which some versions of named can be caused to exit with a REQUIRE assertion failure if they are sent a null command string. Affects BIND 9.9.9->9.9.9-P7, 9.9.10b1->9.9.10rc2, 9.10.4->9.10.4-P7, 9.10.5b1->9.10.5rc2, 9.11.0->9.11.0-P4, 9.11.1b1->9.11.1rc2, 9.9.9-S1->9.9.9-S9.

References

CVSS Scores

version 3.1