CVE-2016-2776

buffer.c in named in ISC BIND 9 before 9.9.9-P3, 9.10.x before 9.10.4-P3, and 9.11.x before 9.11.0rc3 does not properly construct responses, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted query.
References
Link Resource
http://rhn.redhat.com/errata/RHSA-2016-1944.html
http://rhn.redhat.com/errata/RHSA-2016-1945.html
http://rhn.redhat.com/errata/RHSA-2016-2099.html
http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html Third Party Advisory
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html Third Party Advisory
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html Third Party Advisory
http://www.securityfocus.com/bid/93188
http://www.securitytracker.com/id/1036903
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05321107 Third Party Advisory
https://kb.isc.org/article/AA-01419/0 Vendor Advisory
https://kb.isc.org/article/AA-01435
https://kb.isc.org/article/AA-01436
https://kb.isc.org/article/AA-01438
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:28.bind.asc
https://security.gentoo.org/glsa/201610-07
https://security.netapp.com/advisory/ntap-20160930-0001/
https://www.exploit-db.com/exploits/40453/
http://rhn.redhat.com/errata/RHSA-2016-1944.html
http://rhn.redhat.com/errata/RHSA-2016-1945.html
http://rhn.redhat.com/errata/RHSA-2016-2099.html
http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html Third Party Advisory
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html Third Party Advisory
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html Third Party Advisory
http://www.securityfocus.com/bid/93188
http://www.securitytracker.com/id/1036903
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05321107 Third Party Advisory
https://kb.isc.org/article/AA-01419/0 Vendor Advisory
https://kb.isc.org/article/AA-01435
https://kb.isc.org/article/AA-01436
https://kb.isc.org/article/AA-01438
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:28.bind.asc
https://security.gentoo.org/glsa/201610-07
https://security.netapp.com/advisory/ntap-20160930-0001/
https://www.exploit-db.com/exploits/40453/
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*
cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:oracle:vm_server:3.2:*:*:*:*:*:*:*
cpe:2.3:o:oracle:vm_server:3.3:*:*:*:*:*:*:*
cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:isc:bind:*:p3:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.10.0:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.10.0:a1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.10.0:a2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.10.0:b1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.10.0:b2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.10.0:p1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.10.0:p2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.10.0:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.10.0:rc2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.10.1:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.10.1:b1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.10.1:b2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.10.1:p1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.10.1:p2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.10.1:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.10.1:rc2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.10.2:b1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.10.2:p1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.10.2:p2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.10.2:p3:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.10.2:p4:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.10.2:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.10.2:rc2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.10.3:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.10.3:b1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.10.3:p1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.10.3:p2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.10.3:p3:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.10.3:p4:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.10.3:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.10.4:p2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.10.4:p3:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.11.0:a1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.11.0:a2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.11.0:a3:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.11.0:b1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.11.0:b2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.11.0:b3:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.11.0:rc1:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:o:hp:hp-ux:11.31:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:oracle:solaris:10.0:*:*:*:*:*:*:*
cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*

History

21 Nov 2024, 02:48

Type Values Removed Values Added
References () http://rhn.redhat.com/errata/RHSA-2016-1944.html - () http://rhn.redhat.com/errata/RHSA-2016-1944.html -
References () http://rhn.redhat.com/errata/RHSA-2016-1945.html - () http://rhn.redhat.com/errata/RHSA-2016-1945.html -
References () http://rhn.redhat.com/errata/RHSA-2016-2099.html - () http://rhn.redhat.com/errata/RHSA-2016-2099.html -
References () http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html - Third Party Advisory () http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html - Third Party Advisory
References () http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html - Third Party Advisory () http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html - Third Party Advisory
References () http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html - Third Party Advisory () http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html - Third Party Advisory
References () http://www.securityfocus.com/bid/93188 - () http://www.securityfocus.com/bid/93188 -
References () http://www.securitytracker.com/id/1036903 - () http://www.securitytracker.com/id/1036903 -
References () https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05321107 - Third Party Advisory () https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05321107 - Third Party Advisory
References () https://kb.isc.org/article/AA-01419/0 - Vendor Advisory () https://kb.isc.org/article/AA-01419/0 - Vendor Advisory
References () https://kb.isc.org/article/AA-01435 - () https://kb.isc.org/article/AA-01435 -
References () https://kb.isc.org/article/AA-01436 - () https://kb.isc.org/article/AA-01436 -
References () https://kb.isc.org/article/AA-01438 - () https://kb.isc.org/article/AA-01438 -
References () https://security.FreeBSD.org/advisories/FreeBSD-SA-16:28.bind.asc - () https://security.FreeBSD.org/advisories/FreeBSD-SA-16:28.bind.asc -
References () https://security.gentoo.org/glsa/201610-07 - () https://security.gentoo.org/glsa/201610-07 -
References () https://security.netapp.com/advisory/ntap-20160930-0001/ - () https://security.netapp.com/advisory/ntap-20160930-0001/ -
References () https://www.exploit-db.com/exploits/40453/ - () https://www.exploit-db.com/exploits/40453/ -

Information

Published : 2016-09-28 10:59

Updated : 2024-11-21 02:48


NVD link : CVE-2016-2776

Mitre link : CVE-2016-2776

CVE.ORG link : CVE-2016-2776


JSON object : View

Products Affected

oracle

  • vm_server
  • linux
  • solaris

hp

  • hp-ux

isc

  • bind
CWE
CWE-20

Improper Input Validation