CVE-2016-8864
Published Nov 2, 2016
Last updated 4 years ago
Overview
- Description
- named in ISC BIND 9.x before 9.9.9-P4, 9.10.x before 9.10.4-P4, and 9.11.x before 9.11.0-P1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a DNAME record in the answer section of a response to a recursive query, related to db.c and resolver.c.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- CWE-617
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DC6EDE55-A048-4189-92E3-CD86B72968FA", "versionEndExcluding": "9.9.9", "versionStartIncluding": "9.0.0" }, { "criteria": "cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D05ECE4F-94E0-49E6-BFBB-7DDC69D1AD54", "versionEndExcluding": "9.10.4", "versionStartIncluding": "9.10.0" }, { "criteria": "cpe:2.3:a:isc:bind:9.9.9:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2A2CF04B-BF26-43F9-8BF4-CEBB9BE3AE55" }, { "criteria": "cpe:2.3:a:isc:bind:9.9.9:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "81E0A500-84EA-47E2-9767-19D8D08CC344" }, { "criteria": "cpe:2.3:a:isc:bind:9.9.9:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F1E53DC4-53B9-4127-9B8D-96DFFD1E340F" }, { "criteria": "cpe:2.3:a:isc:bind:9.9.9:p1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "376915CA-6BDB-423E-B216-64B098344DD9" }, { "criteria": "cpe:2.3:a:isc:bind:9.9.9:p2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "03215B90-9860-4CB4-B7D2-3DF045B129EB" }, { "criteria": "cpe:2.3:a:isc:bind:9.9.9:p3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "88335D70-E98B-469E-A2E7-1958EB5F10DA" }, { "criteria": "cpe:2.3:a:isc:bind:9.10.4:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "477AA5E9-2C6F-4CCC-B596-F3DF5AAB13C3" }, { "criteria": "cpe:2.3:a:isc:bind:9.10.4:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CCF5FAB8-202C-4892-90C9-237292E840D6" }, { "criteria": "cpe:2.3:a:isc:bind:9.10.4:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4B059C6D-9CB3-48A8-8E9C-AD83000A422A" }, { "criteria": "cpe:2.3:a:isc:bind:9.10.4:beta3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1F463911-2412-433F-87E9-AE9F22846A7C" }, { "criteria": "cpe:2.3:a:isc:bind:9.10.4:p1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BB2D2132-62E8-4E73-A0BF-4790DAFC5558" }, { "criteria": "cpe:2.3:a:isc:bind:9.10.4:p2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E253BD9F-25B8-42E7-BEAB-E843381ED155" }, { "criteria": "cpe:2.3:a:isc:bind:9.10.4:p3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6B5E42E5-27C6-4D6F-B7DC-903B10BF2017" }, { "criteria": "cpe:2.3:a:isc:bind:9.11.0:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "83538F7C-B8A7-4B8F-B0CB-E92400FF2456" }, { "criteria": "cpe:2.3:a:isc:bind:9.11.0:alpha1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1A6E457F-750E-445E-8655-72B0D0342F6F" }, { "criteria": "cpe:2.3:a:isc:bind:9.11.0:alpha2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5C2775BB-32E1-4407-8094-1F7FD86943F2" }, { "criteria": "cpe:2.3:a:isc:bind:9.11.0:alpha3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5A22E38E-0D40-40BA-8FFE-A499F12D041E" }, { "criteria": "cpe:2.3:a:isc:bind:9.11.0:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F88EAF34-A2F3-4189-AD37-510A9E997F78" }, { "criteria": "cpe:2.3:a:isc:bind:9.11.0:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BF5BEF3F-28E2-446C-A6E2-A44FC83EA34E" }, { "criteria": "cpe:2.3:a:isc:bind:9.11.0:beta3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CEDBF802-1C10-4C22-966A-4BDED67BFF75" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E0C4B1E5-75BF-43AE-BBAC-0DD4124C71ED" }, { "criteria": "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737" }, { "criteria": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E94F7F59-1785-493F-91A7-5F5EA5E87E4D" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "133AAFA7-AF42-4D7B-8822-AA2E85611BF5" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "967EC28A-607F-48F4-AD64-5E3041C768F0" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AE1D81A1-CD24-4B17-8AFD-DC95E90AD7D0" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "807C024A-F8E8-4B48-A349-4C68CD252CA1" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F96E3779-F56A-45FF-BB3D-4980527D721E" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0CF73560-2F5B-4723-A8A1-9AADBB3ADA00" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5BF3C7A5-9117-42C7-BEA1-4AA378A582EF" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "83737173-E12E-4641-BC49-0BD84A6B29D0" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "54D669D4-6D7E-449D-80C1-28FA44F06FFE" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AD6D0378-F0F4-4AAA-80AF-8287C790EC96" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AF83BB87-B203-48F9-9D06-48A5FE399050" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1F3BEFDB-5156-4E1C-80BB-8BE9FEAA7623" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "16E6D998-B41D-4B49-9E00-8336D2E40A4A" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1C8D871B-AEA1-4407-AEE3-47EC782250FF" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "98381E61-F082-4302-B51F-5648884F998B" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D99A687E-EAE6-417E-A88E-D0082BC194CD" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B353CE99-D57C-465B-AAB0-73EF581127D1" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7431ABC1-9252-419E-8CC1-311B41360078" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "835AE071-CEAE-49E5-8F0C-E5F50FB85EFC" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "13E02156-E748-4820-B76F-7074793837E1" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6755B6AD-0422-467B-8115-34A60B1D1A40" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B76AA310-FEC7-497F-AF04-C3EC1E76C4CC" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "17F256A9-D3B9-4C72-B013-4EFD878BFEA8" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D0AC5CD5-6E58-433C-9EB3-6DFE5656463E" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43" } ], "operator": "OR" } ] } ]