The BIND installer on Windows uses an unquoted service path which can enable a local user to achieve privilege escalation if the host file system permissions allow this. Affects BIND 9.2.6-P2->9.2.9, 9.3.2-P1->9.3.6, 9.4.0->9.8.8, 9.9.0->9.9.10, 9.10.0->9.10.5, 9.11.0->9.11.1, 9.9.3-S1->9.9.10-S1, 9.10.5-S1.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/99089 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1038693 | Third Party Advisory VDB Entry |
https://kb.isc.org/docs/aa-01496 | Vendor Advisory |
https://security.gentoo.org/glsa/201708-01 | Third Party Advisory |
https://security.netapp.com/advisory/ntap-20180926-0001/ | Third Party Advisory |
https://www.exploit-db.com/exploits/42121/ | Exploit Third Party Advisory VDB Entry |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: isc
Published: 2017-06-14T00:00:00
Updated: 2019-01-17T10:57:01
Reserved: 2016-12-02T00:00:00
Link: CVE-2017-3141
JSON object: View
NVD Information
Status : Modified
Published: 2019-01-16T20:29:00.503
Modified: 2019-10-09T23:27:17.773
Link: CVE-2017-3141
JSON object: View
Redhat Information
No data.
CWE