CVE-2016-2775

ISC BIND 9.x before 9.9.9-P2, 9.10.x before 9.10.4-P2, and 9.11.x before 9.11.0b2, when lwresd or the named lwres option is enabled, allows remote attackers to cause a denial of service (daemon crash) via a long request that uses the lightweight resolver protocol.
References
Link Resource
http://www.securityfocus.com/bid/92037 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1036360 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHBA-2017:0651 Third Party Advisory
https://access.redhat.com/errata/RHBA-2017:1767 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2533 Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05321107 Patch Vendor Advisory
https://kb.isc.org/article/AA-01393/74/CVE-2016-2775 Patch Vendor Advisory
https://kb.isc.org/article/AA-01435 Broken Link
https://kb.isc.org/article/AA-01436 Broken Link
https://kb.isc.org/article/AA-01438 Broken Link
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7T2WJP5ELO4ZRSBXSETIZ3GAO6KOEFTA/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZUCSMEOZIZ2R2SKA4FPLTOVZHJBAOWC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NJ5STNEUHBNEPUHJT7CYEVSMATFYMIX7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TT754KDUJTKOASJODJX7FKHCOQ6EC7UX/
https://security.gentoo.org/glsa/201610-07 Third Party Advisory
https://security.netapp.com/advisory/ntap-20160722-0002/ Third Party Advisory
http://www.securityfocus.com/bid/92037 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1036360 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHBA-2017:0651 Third Party Advisory
https://access.redhat.com/errata/RHBA-2017:1767 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2533 Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05321107 Patch Vendor Advisory
https://kb.isc.org/article/AA-01393/74/CVE-2016-2775 Patch Vendor Advisory
https://kb.isc.org/article/AA-01435 Broken Link
https://kb.isc.org/article/AA-01436 Broken Link
https://kb.isc.org/article/AA-01438 Broken Link
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7T2WJP5ELO4ZRSBXSETIZ3GAO6KOEFTA/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZUCSMEOZIZ2R2SKA4FPLTOVZHJBAOWC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NJ5STNEUHBNEPUHJT7CYEVSMATFYMIX7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TT754KDUJTKOASJODJX7FKHCOQ6EC7UX/
https://security.gentoo.org/glsa/201610-07 Third Party Advisory
https://security.netapp.com/advisory/ntap-20160722-0002/ Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:o:hp:hp-ux:b.11.31:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.9:-:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.9:b1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.9:b2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.9:p1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.9:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.9:s1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.9:s1rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.10.4:-:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.10.4:beta1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.10.4:beta2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.10.4:beta3:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.10.4:p1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.11.0:-:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.11.0:alpha1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.11.0:alpha2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.11.0:alpha3:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.11.0:beta1:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:48

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/92037 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/92037 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1036360 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1036360 - Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHBA-2017:0651 - Third Party Advisory () https://access.redhat.com/errata/RHBA-2017:0651 - Third Party Advisory
References () https://access.redhat.com/errata/RHBA-2017:1767 - Third Party Advisory () https://access.redhat.com/errata/RHBA-2017:1767 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2017:2533 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2017:2533 - Third Party Advisory
References () https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05321107 - Patch, Vendor Advisory () https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05321107 - Patch, Vendor Advisory
References () https://kb.isc.org/article/AA-01393/74/CVE-2016-2775 - Patch, Vendor Advisory () https://kb.isc.org/article/AA-01393/74/CVE-2016-2775 - Patch, Vendor Advisory
References () https://kb.isc.org/article/AA-01435 - Broken Link () https://kb.isc.org/article/AA-01435 - Broken Link
References () https://kb.isc.org/article/AA-01436 - Broken Link () https://kb.isc.org/article/AA-01436 - Broken Link
References () https://kb.isc.org/article/AA-01438 - Broken Link () https://kb.isc.org/article/AA-01438 - Broken Link
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7T2WJP5ELO4ZRSBXSETIZ3GAO6KOEFTA/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7T2WJP5ELO4ZRSBXSETIZ3GAO6KOEFTA/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZUCSMEOZIZ2R2SKA4FPLTOVZHJBAOWC/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZUCSMEOZIZ2R2SKA4FPLTOVZHJBAOWC/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NJ5STNEUHBNEPUHJT7CYEVSMATFYMIX7/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NJ5STNEUHBNEPUHJT7CYEVSMATFYMIX7/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TT754KDUJTKOASJODJX7FKHCOQ6EC7UX/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TT754KDUJTKOASJODJX7FKHCOQ6EC7UX/ -
References () https://security.gentoo.org/glsa/201610-07 - Third Party Advisory () https://security.gentoo.org/glsa/201610-07 - Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20160722-0002/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20160722-0002/ - Third Party Advisory

07 Nov 2023, 02:32

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ5STNEUHBNEPUHJT7CYEVSMATFYMIX7/', 'name': 'FEDORA-2016-53f0c65f40', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7T2WJP5ELO4ZRSBXSETIZ3GAO6KOEFTA/', 'name': 'FEDORA-2016-007efacd1c', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MZUCSMEOZIZ2R2SKA4FPLTOVZHJBAOWC/', 'name': 'FEDORA-2016-2941b3264e', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TT754KDUJTKOASJODJX7FKHCOQ6EC7UX/', 'name': 'FEDORA-2016-3fba74e7f5', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZUCSMEOZIZ2R2SKA4FPLTOVZHJBAOWC/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NJ5STNEUHBNEPUHJT7CYEVSMATFYMIX7/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TT754KDUJTKOASJODJX7FKHCOQ6EC7UX/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7T2WJP5ELO4ZRSBXSETIZ3GAO6KOEFTA/ -

Information

Published : 2016-07-19 22:59

Updated : 2024-11-21 02:48


NVD link : CVE-2016-2775

Mitre link : CVE-2016-2775

CVE.ORG link : CVE-2016-2775


JSON object : View

Products Affected

redhat

  • enterprise_linux_workstation
  • enterprise_linux_eus
  • enterprise_linux_server_tus
  • enterprise_linux_server
  • enterprise_linux_desktop
  • enterprise_linux_server_aus

fedoraproject

  • fedora

isc

  • bind

hp

  • hp-ux
CWE
CWE-20

Improper Input Validation