A denial of service flaw was found in the way BIND handled DNSSEC validation. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-3139.json"
[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.4"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.5"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.6"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.7"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.5"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.6"
}
]
}
]