SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Router/Bridge/Hub)  >   Juniper Junos Vendors:   Juniper
(Juniper Issues Fix for Juniper Junos) BIND RPZ and DNS64 State Error Lets Remote Users Cause the Target Service to Crash
SecurityTracker Alert ID:  1038897
SecurityTracker URL:  http://securitytracker.com/id/1038897
CVE Reference:   CVE-2017-3135   (Links to External Site)
Date:  Jul 13 2017
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 12.3X46, 12.3X48, 15.1X49
Description:   A vulnerability was reported in BIND. A remote user can cause the target service to crash in certain cases. Juniper Junos is affected.

A remote user can trigger a state error in query processing and cause the target service to crash.

Some configurations using both Response Policy Zones (RPZ) and DNS64 to rewrite query responses are affected.

Ramesh Damodaran (Infoblox) and Aliaksandr Shubnik (Infoblox) reported this vulnerability.

Impact:   A remote user can cause the target service to crash.
Solution:   The Juniper has issued a fix for Juniper Junos (12.1X46-D67, 12.3X48-D50, 15.1X49-D80, 17.2R1).

The Juniper advisory is available at:

https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10799

Vendor URL:  kb.juniper.net/InfoCenter/index?page=content&id=JSA10799 (Links to External Site)
Cause:   State error

Message History:   This archive entry is a follow-up to the message listed below.
Feb 9 2017 BIND RPZ and DNS64 State Error Lets Remote Users Cause the Target Service to Crash



 Source Message Contents

Subject:  https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10799

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC