{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T18:26:48.678","vulnerabilities":[{"cve":{"id":"CVE-2017-3140","sourceIdentifier":"security-officer@isc.org","published":"2019-01-16T20:29:00.457","lastModified":"2024-11-21T03:24:55.003","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"If named is configured to use Response Policy Zones (RPZ) an error processing some rule types can lead to a condition where BIND will endlessly loop while handling a query. Affects BIND 9.9.10, 9.10.5, 9.11.0->9.11.1, 9.9.10-S1, 9.10.5-S1."},{"lang":"es","value":"Si named está configurado para que emplee RPZ (Response Policy Zones), un error a a hora de procesar algunos tipos de regla puede conducir a una condición en la que BIND entrará en un bucle infinito al manejar una consulta. Afecta a BIND en la versión 9.9.10, 9.10.5, desde la versión 9.11.0 hasta la 9.11.1 y en las versiones  9.9.10-S1 y 9.10.5-S1."}],"metrics":{"cvssMetricV30":[{"source":"security-officer@isc.org","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L","baseScore":3.7,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":2.2,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":5.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:N/A:P","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-400"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*","versionStartIncluding":"9.11.0","versionEndIncluding":"9.11.1","matchCriteriaId":"A8E6E2D9-E137-498C-B175-1CA268B6E551"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:9.9.10:*:*:*:*:*:*:*","matchCriteriaId":"A64173CC-F89B-4276-8E33-525CC89A22A1"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:9.9.10:s1:*:*:*:*:*:*","matchCriteriaId":"96715BE6-F6C4-4A9E-85F2-4E53FE740776"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:9.10.5:*:*:*:*:*:*:*","matchCriteriaId":"30ACDFC4-CD8D-4B89-B6C8-8466174B3D76"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:9.10.5:s1:*:*:*:*:*:*","matchCriteriaId":"82A6F259-EB06-4F31-9F68-A76F257756DC"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*","matchCriteriaId":"E0C4B1E5-75BF-43AE-BBAC-0DD4124C71ED"},{"vulnerable":true,"criteria":"cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*","matchCriteriaId":"85DF4B3F-4BBC-42B7-B729-096934523D63"},{"vulnerable":true,"criteria":"cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*","matchCriteriaId":"7DCBCC5D-C396-47A8-ADF4-D3A2C4377FB1"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/99088","source":"security-officer@isc.org","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securitytracker.com/id/1038692","source":"security-officer@isc.org","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03772en_us","source":"security-officer@isc.org","tags":["Third Party Advisory"]},{"url":"https://kb.isc.org/docs/aa-01495","source":"security-officer@isc.org","tags":["Vendor Advisory"]},{"url":"https://security.gentoo.org/glsa/201708-01","source":"security-officer@isc.org","tags":["Third Party Advisory"]},{"url":"https://security.netapp.com/advisory/ntap-20180926-0001/","source":"security-officer@isc.org","tags":["Third Party Advisory"]},{"url":"http://www.securityfocus.com/bid/99088","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securitytracker.com/id/1038692","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03772en_us","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://kb.isc.org/docs/aa-01495","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://security.gentoo.org/glsa/201708-01","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://security.netapp.com/advisory/ntap-20180926-0001/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}