### [CVE-2017-3136](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3136) ![](https://img.shields.io/static/v1?label=Product&message=BIND%209&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Servers%20are%20at%20risk%20if%20they%20are%20configured%20to%20use%20DNS64%20and%20if%20the%20option%20%22break-dnssec%20yes%3B%22%20is%20in%20use.&color=brighgreen) ### Description A query with a specific set of characteristics could cause a server using DNS64 to encounter an assertion failure and terminate. An attacker could deliberately construct a query, enabling denial-of-service against a server if it was configured to use the DNS64 feature and other preconditions were met. Affects BIND 9.8.0 -> 9.8.8-P1, 9.9.0 -> 9.9.9-P6, 9.9.10b1->9.9.10rc1, 9.10.0 -> 9.10.4-P6, 9.10.5b1->9.10.5rc1, 9.11.0 -> 9.11.0-P3, 9.11.1b1->9.11.1rc1, 9.9.3-S1 -> 9.9.9-S8. ### POC #### Reference No PoCs from references. #### Github - https://github.com/ALTinners/bind9 - https://github.com/ARPSyndicate/cvemon - https://github.com/AndrewLipscomb/bind9 - https://github.com/balabit-deps/balabit-os-7-bind9 - https://github.com/balabit-deps/balabit-os-8-bind9-libs - https://github.com/balabit-deps/balabit-os-9-bind9-libs - https://github.com/pexip/os-bind9 - https://github.com/pexip/os-bind9-libs - https://github.com/psmedley/bind-os2