{"vulnerability": "cve-2017-3143", "sightings": [{"uuid": "e0e2af6d-9ebe-4f92-ada1-e10e307dd3ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-3143", "type": "seen", "source": "https://t.me/arpsyndicate/1799", "content": "#ExploitObserverAlert\n\nCVE-2017-3143\n\nDESCRIPTION: Exploit Observer has 28 entries related to CVE-2017-3143. An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name for the zone and service being targeted may be able to manipulate BIND into accepting an unauthorized dynamic update. Affects BIND 9.4.0-&gt;9.8.8, 9.9.0-&gt;9.9.10-P1, 9.10.0-&gt;9.10.5-P1, 9.11.0-&gt;9.11.1-P1, 9.9.3-S1-&gt;9.9.10-S2, 9.10.5-S1-&gt;9.10.5-S2.\n\nFIRST-EPSS: 0.029520000\nNVD-IS: 3.6\nNVD-ES: 2.2", "creation_timestamp": "2023-12-12T11:25:29.000000Z"}, {"uuid": "ab9b0268-455f-49b3-8675-f9154b89cb9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-3143", "type": "published-proof-of-concept", "source": "https://t.me/secharvester/330", "content": "Authentication bypass through signature forgery in BIND : CVE-2017-3143 - http://www.synacktiv.ninja/ressources/CVE-2017-3143_BIND9_TSIG_dynamic_updates_vulnerability_Synacktiv.pdf", "creation_timestamp": "2017-07-06T18:01:44.000000Z"}]}