Description
The BIND installer on Windows uses an unquoted service path which can enable a local user to achieve privilege escalation if the host file system permissions allow this. Affects BIND 9.2.6-P2->9.2.9, 9.3.2-P1->9.3.6, 9.4.0->9.8.8, 9.9.0->9.9.10, 9.10.0->9.10.5, 9.11.0->9.11.1, 9.9.3-S1->9.9.10-S1, 9.10.5-S1.
Exploits (1)
References (6)
Core 6
Core References
Vendor Advisory x_refsource_confirm
https://kb.isc.org/docs/aa-01496
Third Party Advisory vendor-advisory
x_refsource_gentoo
https://security.gentoo.org/glsa/201708-01
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://www.securitytracker.com/id/1038693
Exploit, Third Party Advisory, VDB Entry exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/42121/
Third Party Advisory x_refsource_confirm
https://security.netapp.com/advisory/ntap-20180926-0001/
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/99089
Scores
CVSS v3
7.2
EPSS
0.0310
EPSS Percentile
86.9%
Attack Vector
LOCAL
CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H
Details
CWE
CWE-428
Status
published
Products (3)
isc/bind
9.2.6 p2
isc/bind
9.3.2 p1
isc/bind
9.2.6 - 9.2.9
Published
Jan 16, 2019
Tracked Since
Feb 18, 2026