- Home
- CVEs with nessus.description==BIND was improperly sequencing cleanup operations on upstream recursion fetch contexts, leading in some cases to a use-after-free error that can trigger an assertion failure and crash in named.
(CVE-2017-3145)
Impact
BIG-IP
A remote attacker can use this flaw to make named , acting as a Domain Name System Security Extensions (DNSSEC) validating resolver, exit unexpectedly with an assertion failure by way of a specially crafted DNS request.
This vulnerability affects BIND only when configured as a recursive resolver with DNSSEC validation enabled. That mode of operation is not present in any default configuration but can be enabled.
ARX, Enterprise Manager, BIG-IQ, F5 iWorkflow, LineRate, and Traffix
There is no impact; these F5 products are not affected by this vulnerability.
Max CVSS | 0 |
Min CVSS | 0 |
Total Count | 2 |
| ID | CVSS | Summary | Last (major) update | Published |
Back to Top
Mark selected
Back to Top