漏洞类别:Ubuntu
漏洞等级:
漏洞信息
It was discovered that the resolver in Bind made incorrect assumptions about ordering when processing responses containing a CNAME or DNAME.
It was discovered that in some situations, Bind did not properly handle DNS64 queries.
It was discovered that in some situations, Bind did not properly handle invalid operations requested via its control channel.
漏洞危害
An attacker could use this cause a denial of service. (CVE-2017-3137)
An attacker could use this to cause a denial of service. (CVE-2017-3136)
An attacker with access to the control channel could cause a denial of service. (CVE-2017-3138)
解决方案
Refer to Ubuntu advisory USN-3259-1 for affected packages and patching details, or update with your package manager.
Patch:
Following are links for downloading patches to fix the vulnerabilities:
USN-3259-1: 16.04 (Xenial) on src (bind9)
USN-3259-1: 17.04 (zesty) on src (bind9)
USN-3259-1: 16.10 (Yakkety) on src (bind9)
0day
文章评论