Files
CVEs-PoC/2017/CVE-2017-3136.md
T
2025-09-29 21:09:30 +02:00

28 lines
1.7 KiB
Markdown

### [CVE-2017-3136](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3136)
![](https://img.shields.io/static/v1?label=Product&message=BIND%209&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=9.8.0%20-%3E%209.8.8-P1%2C%209.9.0%20-%3E%209.9.9-P6%2C%209.9.10b1-%3E9.9.10rc1%2C%209.10.0%20-%3E%209.10.4-P6%2C%209.10.5b1-%3E9.10.5rc1%2C%209.11.0%20-%3E%209.11.0-P3%2C%209.11.1b1-%3E9.11.1rc1%2C%209.9.3-S1%20-%3E%209.9.9-S8%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Servers%20are%20at%20risk%20if%20they%20are%20configured%20to%20use%20DNS64%20and%20if%20the%20option%20%22break-dnssec%20yes%3B%22%20is%20in%20use.&color=brightgreen)
### Description
A query with a specific set of characteristics could cause a server using DNS64 to encounter an assertion failure and terminate. An attacker could deliberately construct a query, enabling denial-of-service against a server if it was configured to use the DNS64 feature and other preconditions were met. Affects BIND 9.8.0 -> 9.8.8-P1, 9.9.0 -> 9.9.9-P6, 9.9.10b1->9.9.10rc1, 9.10.0 -> 9.10.4-P6, 9.10.5b1->9.10.5rc1, 9.11.0 -> 9.11.0-P3, 9.11.1b1->9.11.1rc1, 9.9.3-S1 -> 9.9.9-S8.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ALTinners/bind9
- https://github.com/ARPSyndicate/cvemon
- https://github.com/AndrewLipscomb/bind9
- https://github.com/Maribel0370/Nebula-io
- https://github.com/balabit-deps/balabit-os-7-bind9
- https://github.com/balabit-deps/balabit-os-8-bind9-libs
- https://github.com/balabit-deps/balabit-os-9-bind9-libs
- https://github.com/openkylin/bind9-libs
- https://github.com/pexip/os-bind9
- https://github.com/pexip/os-bind9-libs
- https://github.com/psmedley/bind-os2