On June 28,2017, ISC announcedCVE-2017-3142:A TSIGvulnerabilitywhich allows unauthorized zone transfer under some circumstances.
On June 28,2017, ISC announcedCVE-2017-3143:A TSIGvulnerabilitywhich allows unauthorized DDNS updates under some circumstances.
CVE-2017-3142: Thisvulnerabilityis exposed only if using:
- authoritative BIND DNS server - accepting TSIG AXFR requests
If both conditions are met, an unauthorized zone transfer of a TSIG-dynamically updated zone may be allowed under some circumstances.
CVE-2017-3143: Thisvulnerabilityis exposed only if using:
- authoritative BIND DNS server - accepting TSIG DDNS updates
If both conditions are met, anunauthorized TSIG DDNS updates for a TSIG-key updated zone may be allowed under some circumstances.
CVE-2017-3142:An attacker able to send and receive messages to an authoritative DNS server may be able to circumvent TSIG authentication of AXFR requests via a carefully constructed request packet. A server that relies solely on TSIG keys for protection with no other ACL protection could be manipulated into: providing an AXFR of a zone to an unauthorized recipient and/or accepting bogus Notify packets.
CVE-2017-3143:An attacker who can send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name for the zone and service being targeted, may be able to manipulate BIND into accepting a dynamic update.
An unauthorized AXFR (full zone transfer) permits an attacker to view the entire contents of a zone. Protection of zone contents is often a commercial or business requirement.
If accepted, a Notify sets the zone refresh interval to 'now'. If there is not already a refresh cycle in progress then named will initiate one by asking for the SOA RR from its list of masters. If there is already a refresh cycle in progress, then named will queue the new refresh request. If there is already a queued refresh request, the new Notify will be discarded. Bogus notifications can't be used to force a zone transfer from a malicious server, but could trigger a high rate of zone refresh cycles.
A server that relies solely on TSIG or SIG(0) keys with no other address-based ACL protection could bevulnerableto malicious zone content manipulation using this technique.
All currently supportedNIOScode releases arevulnerabletoCVE-2017-3142:andCVE-2017-3143.
No suitable work around for theInfobloxNIOSproduct.
InfobloxNIOSproductisvulnerabletoCVE-2017-3142andCVE-2017-3142, we strongly suggest our customer usingInfobloxNIOSproductas DNS authoritative servers and configured to accept TSIG dynamic updates, to upgrade to the following releases available on our website: