{"containers":{"cna":{"affected":[{"product":"BIND 9","vendor":"ISC","versions":[{"status":"affected","version":"9.2.6-P2->9.2.9, 9.3.2-P1->9.3.6, 9.4.0->9.8.8, 9.9.0->9.9.10, 9.10.0->9.10.5, 9.11.0->9.11.1, 9.9.3-S1->9.9.10-S1, 9.10.5-S1"}]}],"credits":[{"lang":"en","value":"ISC would like to thank John Page aka hyp3rlinx for reporting this issue."}],"datePublic":"2017-06-14T00:00:00.000Z","descriptions":[{"lang":"en","value":"The BIND installer on Windows uses an unquoted service path which can enable a local user to achieve privilege escalation if the host file system permissions allow this. Affects BIND 9.2.6-P2->9.2.9, 9.3.2-P1->9.3.6, 9.4.0->9.8.8, 9.9.0->9.9.10, 9.10.0->9.10.5, 9.11.0->9.11.1, 9.9.3-S1->9.9.10-S1, 9.10.5-S1."}],"exploits":[{"lang":"en","value":"No known active exploits but this generic weakness is already a well-known attack vector if user file access permissions do not adequately prevent the installation of malicious executables."}],"metrics":[{"cvssV3_0":{"attackComplexity":"HIGH","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H","version":"3.0"}}],"problemTypes":[{"descriptions":[{"description":"This vulnerability exists in the installer delivered with BIND for Windows and not within BIND itself.  Non-Windows builds and installations are unaffected.  A manual installation of BIND where the service path is quoted when added would not be at risk.","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2019-01-17T10:57:01.000Z","orgId":"404fd4d2-a609-4245-b543-2c944a302a22","shortName":"isc"},"references":[{"name":"GLSA-201708-01","tags":["vendor-advisory","x_refsource_GENTOO"],"url":"https://security.gentoo.org/glsa/201708-01"},{"tags":["x_refsource_CONFIRM"],"url":"https://kb.isc.org/docs/aa-01496"},{"name":"1038693","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://www.securitytracker.com/id/1038693"},{"name":"42121","tags":["exploit","x_refsource_EXPLOIT-DB"],"url":"https://www.exploit-db.com/exploits/42121/"},{"tags":["x_refsource_CONFIRM"],"url":"https://security.netapp.com/advisory/ntap-20180926-0001/"},{"name":"99089","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/99089"}],"solutions":[{"lang":"en","value":"Upgrade to the patched release most closely related to your current version of BIND.  These can all be downloaded from http://www.isc.org/downloads.\n\n    BIND 9 version 9.9.10-P1\n    BIND 9 version 9.10.5-P1\n    BIND 9 version 9.11.1-P1\n\nBIND Supported Preview Edition is a special feature preview branch of BIND provided to eligible ISC support customers.\n\n    BIND 9 version 9.9.10-S2\n    BIND 9 version 9.10.5-S2"}],"source":{"discovery":"UNKNOWN"},"title":"Windows service and uninstall paths are not quoted when BIND is installed","workarounds":[{"lang":"en","value":"BIND installations on Windows are not at risk if the host file permissions prevent creation of a binary in a location where the service executor would run it instead of named.exe."}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"security-officer@isc.org","DATE_PUBLIC":"2017-06-14T00:00:00.000Z","ID":"CVE-2017-3141","STATE":"PUBLIC","TITLE":"Windows service and uninstall paths are not quoted when BIND is installed"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"BIND 9","version":{"version_data":[{"version_value":"9.2.6-P2->9.2.9, 9.3.2-P1->9.3.6, 9.4.0->9.8.8, 9.9.0->9.9.10, 9.10.0->9.10.5, 9.11.0->9.11.1, 9.9.3-S1->9.9.10-S1, 9.10.5-S1"}]}}]},"vendor_name":"ISC"}]}},"credit":[{"lang":"eng","value":"ISC would like to thank John Page aka hyp3rlinx for reporting this issue."}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The BIND installer on Windows uses an unquoted service path which can enable a local user to achieve privilege escalation if the host file system permissions allow this. Affects BIND 9.2.6-P2->9.2.9, 9.3.2-P1->9.3.6, 9.4.0->9.8.8, 9.9.0->9.9.10, 9.10.0->9.10.5, 9.11.0->9.11.1, 9.9.3-S1->9.9.10-S1, 9.10.5-S1."}]},"exploit":[{"lang":"en","value":"No known active exploits but this generic weakness is already a well-known attack vector if user file access permissions do not adequately prevent the installation of malicious executables."}],"impact":{"cvss":{"attackComplexity":"HIGH","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H","version":"3.0"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"This vulnerability exists in the installer delivered with BIND for Windows and not within BIND itself.  Non-Windows builds and installations are unaffected.  A manual installation of BIND where the service path is quoted when added would not be at risk."}]}]},"references":{"reference_data":[{"name":"GLSA-201708-01","refsource":"GENTOO","url":"https://security.gentoo.org/glsa/201708-01"},{"name":"https://kb.isc.org/docs/aa-01496","refsource":"CONFIRM","url":"https://kb.isc.org/docs/aa-01496"},{"name":"1038693","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1038693"},{"name":"42121","refsource":"EXPLOIT-DB","url":"https://www.exploit-db.com/exploits/42121/"},{"name":"https://security.netapp.com/advisory/ntap-20180926-0001/","refsource":"CONFIRM","url":"https://security.netapp.com/advisory/ntap-20180926-0001/"},{"name":"99089","refsource":"BID","url":"http://www.securityfocus.com/bid/99089"}]},"solution":[{"lang":"en","value":"Upgrade to the patched release most closely related to your current version of BIND.  These can all be downloaded from http://www.isc.org/downloads.\n\n    BIND 9 version 9.9.10-P1\n    BIND 9 version 9.10.5-P1\n    BIND 9 version 9.11.1-P1\n\nBIND Supported Preview Edition is a special feature preview branch of BIND provided to eligible ISC support customers.\n\n    BIND 9 version 9.9.10-S2\n    BIND 9 version 9.10.5-S2"}],"source":{"discovery":"UNKNOWN"},"work_around":[{"lang":"en","value":"BIND installations on Windows are not at risk if the host file permissions prevent creation of a binary in a location where the service executor would run it instead of named.exe."}]}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T14:16:28.229Z"},"title":"CVE Program Container","references":[{"name":"GLSA-201708-01","tags":["vendor-advisory","x_refsource_GENTOO","x_transferred"],"url":"https://security.gentoo.org/glsa/201708-01"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://kb.isc.org/docs/aa-01496"},{"name":"1038693","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://www.securitytracker.com/id/1038693"},{"name":"42121","tags":["exploit","x_refsource_EXPLOIT-DB","x_transferred"],"url":"https://www.exploit-db.com/exploits/42121/"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://security.netapp.com/advisory/ntap-20180926-0001/"},{"name":"99089","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/99089"}]}]},"cveMetadata":{"assignerOrgId":"404fd4d2-a609-4245-b543-2c944a302a22","assignerShortName":"isc","cveId":"CVE-2017-3141","datePublished":"2019-01-16T20:00:00.000Z","dateReserved":"2016-12-02T00:00:00.000Z","dateUpdated":"2024-09-16T17:23:44.753Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}