CVE-2017-3141
moderate-risk
Published 2019-01-16
The BIND installer on Windows uses an unquoted service path which can enable a local user to achieve privilege escalation if the host file system permissions allow this. Affects BIND 9.2.6-P2->9.2.9, 9.3.2-P1->9.3.6, 9.4.0->9.8.8, 9.9.0->9.9.10, 9.10.0->9.10.5, 9.11.0->9.11.1, 9.9.3-S1->9.9.10-S1, 9.10.5-S1.
Do I need to act?
~
3.1% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
!
1 public exploit available
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.2/10
High
LOCAL
/ HIGH complexity
Affected Vendors
References (12)
Third Party Advisory
http://www.securityfocus.com/bid/99089
Third Party Advisory
http://www.securitytracker.com/id/1038693
Vendor Advisory
https://kb.isc.org/docs/aa-01496
Third Party Advisory
https://security.gentoo.org/glsa/201708-01
Third Party Advisory
https://security.netapp.com/advisory/ntap-20180926-0001/
Third Party Advisory
http://www.securityfocus.com/bid/99089
Third Party Advisory
http://www.securitytracker.com/id/1038693
Vendor Advisory
https://kb.isc.org/docs/aa-01496
Third Party Advisory
https://security.gentoo.org/glsa/201708-01
Third Party Advisory
https://security.netapp.com/advisory/ntap-20180926-0001/
34
/ 100
moderate-risk
Severity
19/34 · Moderate
Exploitability
6/34 · Minimal
Exposure
9/34 · Low