Users login

Create an account »


Users login

Home » Security Advisories» Ubuntu » Bind vulnerabilities

Bind vulnerabilities

  • Vendor: Ubuntu
  • Vendor ID: USN-3259-1
  • Date: April 17, 2017

Ubuntu Security Notice USN-3259-1
April 17, 2017

bind9 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 17.04
- Ubuntu 16.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS


Several security issues were fixed in Bind.

Software Description:
- bind9: Internet Domain Name Server


It was discovered that the resolver in Bind made incorrect
assumptions about ordering when processing responses containing
a CNAME or DNAME. An attacker could use this cause a denial of
service. (CVE-2017-3137)

Oleg Gorokhov discovered that in some situations, Bind did not properly
handle DNS64 queries. An attacker could use this to cause a denial
of service. (CVE-2017-3136)

Mike Lalumiere discovered that in some situations, Bind did
not properly handle invalid operations requested via its control
channel. An attacker with access to the control channel could cause
a denial of service. (CVE-2017-3138)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 17.04:
bind9 1:9.10.3.dfsg.P4-10.1ubuntu5

Ubuntu 16.10:
bind9 1:9.10.3.dfsg.P4-10.1ubuntu1.6

Ubuntu 16.04 LTS:
bind9 1:9.10.3.dfsg.P4-8ubuntu1.6

Ubuntu 14.04 LTS:
bind9 1:9.9.5.dfsg-3ubuntu0.14

Ubuntu 12.04 LTS:
bind9 1:9.8.1.dfsg.P1-4ubuntu0.22

In general, a standard system update will make all the necessary changes.

CVE-2017-3136, CVE-2017-3137, CVE-2017-3138

Package Information:

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: not available
URL: <>

Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.


Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »