CVE-2017-3141

HIGH

ISC Bind < 9.2.9 - Privilege Escalation

Title source: rule
STIX 2.1

Description

The BIND installer on Windows uses an unquoted service path which can enable a local user to achieve privilege escalation if the host file system permissions allow this. Affects BIND 9.2.6-P2->9.2.9, 9.3.2-P1->9.3.6, 9.4.0->9.8.8, 9.9.0->9.9.10, 9.10.0->9.10.5, 9.11.0->9.11.1, 9.9.3-S1->9.9.10-S1, 9.10.5-S1.

Exploits (1)

exploitdb WRITEUP
by hyp3rlinx · textlocalwindows
https://www.exploit-db.com/exploits/42121

References (6)

Core 6
Core References
Vendor Advisory x_refsource_confirm
https://kb.isc.org/docs/aa-01496
Third Party Advisory vendor-advisory x_refsource_gentoo
https://security.gentoo.org/glsa/201708-01
Third Party Advisory, VDB Entry vdb-entry x_refsource_sectrack
http://www.securitytracker.com/id/1038693
Exploit, Third Party Advisory, VDB Entry exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/42121/
Third Party Advisory x_refsource_confirm
https://security.netapp.com/advisory/ntap-20180926-0001/
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/99089

Scores

CVSS v3 7.2
EPSS 0.0310
EPSS Percentile 86.9%
Attack Vector LOCAL
CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H

Details

CWE
CWE-428
Status published
Products (3)
isc/bind 9.2.6 p2
isc/bind 9.3.2 p1
isc/bind 9.2.6 - 9.2.9
Published Jan 16, 2019
Tracked Since Feb 18, 2026