CVE-2016-2088
Published Mar 9, 2016
Last updated 7 years ago
Overview
- Description
- resolver.c in named in ISC BIND 9.10.x before 9.10.3-P4, when DNS cookies are enabled, allows remote attackers to cause a denial of service (INSIST assertion failure and daemon exit) via a malformed packet with more than one cookie option.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 4
- Exploitability score
- 2.2
- Vector string
- CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- CWE-20
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:isc:bind:9.10.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "92ECA27E-4248-49BD-A84C-4854CCA19AC5" }, { "criteria": "cpe:2.3:a:isc:bind:9.10.0:a1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8B0C031F-96F1-4117-83B7-82EE749FC6BB" }, { "criteria": "cpe:2.3:a:isc:bind:9.10.0:a2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F5D7D5B7-5696-4B51-954E-F32DF9617D9E" }, { "criteria": "cpe:2.3:a:isc:bind:9.10.0:b1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2B953804-C53B-4C77-AAE4-C60961C23A39" }, { "criteria": "cpe:2.3:a:isc:bind:9.10.0:b2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "51BBFF21-4E77-44EC-B472-6925904772AC" }, { "criteria": "cpe:2.3:a:isc:bind:9.10.0:p1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8FAA10DC-71AC-4E56-900A-B69B24917DE7" }, { "criteria": "cpe:2.3:a:isc:bind:9.10.0:p2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9A0C5E26-B896-449D-B004-337C9C0C40F5" }, { "criteria": "cpe:2.3:a:isc:bind:9.10.0:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "444326E3-9D0D-4C9F-9B86-2AB6ADE1F405" }, { "criteria": "cpe:2.3:a:isc:bind:9.10.0:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "812CD568-82C1-4F44-99BA-1F1DF3AF16EF" }, { "criteria": "cpe:2.3:a:isc:bind:9.10.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "16EB6777-8E49-4B07-B859-06D0C2F29DC8" }, { "criteria": "cpe:2.3:a:isc:bind:9.10.1:b1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A2574190-E1DC-46B9-AE82-5581960D8819" }, { "criteria": "cpe:2.3:a:isc:bind:9.10.1:b2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5EB06ECC-D36F-4BE7-93BF-8B1C025298EA" }, { "criteria": "cpe:2.3:a:isc:bind:9.10.1:p1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "54E5A7DC-D432-470A-B95A-AF8EE1ECB561" }, { "criteria": "cpe:2.3:a:isc:bind:9.10.1:p2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A6F3181D-BB94-4700-A66C-8503B7B4107C" }, { "criteria": "cpe:2.3:a:isc:bind:9.10.1:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8EB2A5D6-DEDF-4962-8117-2F1FADB5B984" }, { "criteria": "cpe:2.3:a:isc:bind:9.10.1:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "26B6584A-707A-463C-BB2F-1D663FE50C01" }, { "criteria": "cpe:2.3:a:isc:bind:9.10.2:b1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D35C161A-3CCC-4FFC-9698-98FAE71BBF2F" }, { "criteria": "cpe:2.3:a:isc:bind:9.10.2:p1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6518FD7D-0249-4793-9531-E5338EEC4C7B" }, { "criteria": "cpe:2.3:a:isc:bind:9.10.2:p2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D468B433-D785-4A5B-A8CC-B2F1B27BAB7C" }, { "criteria": "cpe:2.3:a:isc:bind:9.10.2:p3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7BCF9BD9-F557-408C-9CD7-BD0EAD66366F" }, { "criteria": "cpe:2.3:a:isc:bind:9.10.2:p4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "407F36C2-886C-48A7-A3AB-E5F9194775D0" }, { "criteria": "cpe:2.3:a:isc:bind:9.10.2:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "24CEA3F3-C4F8-4BD1-92EA-AC1B54A3CFE6" }, { "criteria": "cpe:2.3:a:isc:bind:9.10.2:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "574C2F69-C5A0-48C6-8F13-C164518B8ED8" }, { "criteria": "cpe:2.3:a:isc:bind:9.10.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "40BD4A8C-785C-4460-AB52-B249C5DC9BC3" }, { "criteria": "cpe:2.3:a:isc:bind:9.10.3:b1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6AAE7145-F1BA-4BEA-841E-DEE08891A3D5" }, { "criteria": "cpe:2.3:a:isc:bind:9.10.3:p1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "88359A5D-CE32-4920-BE5D-98EC262B41EB" }, { "criteria": "cpe:2.3:a:isc:bind:9.10.3:p2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B77760E4-57C5-4A5E-A169-C84409930757" }, { "criteria": "cpe:2.3:a:isc:bind:9.10.3:p3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "24E9CBCA-241C-4EF6-8C0C-FA32E81B8B7C" }, { "criteria": "cpe:2.3:a:isc:bind:9.10.3:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "893ACAAC-406E-4A1C-970B-A15B42961271" } ], "operator": "OR" } ] } ]