Multiple vulnerabilities were found in the ISC BIND software. A remote attacker could send a specially crafted query to trigger an error in processing Response Policy Zones (RPZ) rules and cause an endless loop and repeatedly query the same sets of authoritative nameservers. In addition, a local attacker could obtain elevated privilege by exploiting an unquoted service path in the BIND installer on Windows-based systems.
Successful exploitation could lead to a denial of service (DoS) condition and privilege escalation on an affected system.
Internet Systems Consortium (ISC) has released the following patches to solve the problems:
http://www.isc.org/downloads/
Users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.
https://kb.isc.org/article/AA-01495
https://kb.isc.org/article/AA-01496
https://www.us-cert.gov/ncas/current-activity/2017/06/15/ISC-Releases-Security-Updates-BIND
https://www.hkcert.org/my_url/en/alert/17061601
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3140
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3141