fkie_cve-2016-2776
Vulnerability from fkie_nvd
Published
2016-09-28 10:59
Modified
2025-04-12 10:46
Severity ?
Summary
buffer.c in named in ISC BIND 9 before 9.9.9-P3, 9.10.x before 9.10.4-P3, and 9.11.x before 9.11.0rc3 does not properly construct responses, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted query.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| oracle | linux | 5.0 | |
| oracle | linux | 6 | |
| oracle | linux | 7 | |
| oracle | vm_server | 3.2 | |
| oracle | vm_server | 3.3 | |
| oracle | vm_server | 3.4 | |
| isc | bind | * | |
| isc | bind | 9.10.0 | |
| isc | bind | 9.10.0 | |
| isc | bind | 9.10.0 | |
| isc | bind | 9.10.0 | |
| isc | bind | 9.10.0 | |
| isc | bind | 9.10.0 | |
| isc | bind | 9.10.0 | |
| isc | bind | 9.10.0 | |
| isc | bind | 9.10.0 | |
| isc | bind | 9.10.1 | |
| isc | bind | 9.10.1 | |
| isc | bind | 9.10.1 | |
| isc | bind | 9.10.1 | |
| isc | bind | 9.10.1 | |
| isc | bind | 9.10.1 | |
| isc | bind | 9.10.1 | |
| isc | bind | 9.10.2 | |
| isc | bind | 9.10.2 | |
| isc | bind | 9.10.2 | |
| isc | bind | 9.10.2 | |
| isc | bind | 9.10.2 | |
| isc | bind | 9.10.2 | |
| isc | bind | 9.10.2 | |
| isc | bind | 9.10.3 | |
| isc | bind | 9.10.3 | |
| isc | bind | 9.10.3 | |
| isc | bind | 9.10.3 | |
| isc | bind | 9.10.3 | |
| isc | bind | 9.10.3 | |
| isc | bind | 9.10.3 | |
| isc | bind | 9.10.4 | |
| isc | bind | 9.10.4 | |
| isc | bind | 9.11.0 | |
| isc | bind | 9.11.0 | |
| isc | bind | 9.11.0 | |
| isc | bind | 9.11.0 | |
| isc | bind | 9.11.0 | |
| isc | bind | 9.11.0 | |
| isc | bind | 9.11.0 | |
| hp | hp-ux | 11.31 | |
| oracle | solaris | 10.0 | |
| oracle | solaris | 11.3 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E3CCD459-9E6D-4731-8054-CDF8B58454A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*",
"matchCriteriaId": "CC7A498A-A669-4C42-8134-86103C799D13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
"matchCriteriaId": "104DA87B-DEE4-4262-AE50-8E6BC43B228B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:oracle:vm_server:3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5FEC7F7E-AA94-4405-93D6-D0194A37D3C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:oracle:vm_server:3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C2D62B2C-40E5-41B7-9DAA-029BCD079054",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "4BA58099-26F7-4B01-B9FC-275F012FE9C6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:isc:bind:*:p3:*:*:*:*:*:*",
"matchCriteriaId": "301946B1-A4F0-4123-BAF9-ACDDBA5DFB23",
"versionEndIncluding": "9.9.9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "92ECA27E-4248-49BD-A84C-4854CCA19AC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.10.0:a1:*:*:*:*:*:*",
"matchCriteriaId": "8B0C031F-96F1-4117-83B7-82EE749FC6BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.10.0:a2:*:*:*:*:*:*",
"matchCriteriaId": "F5D7D5B7-5696-4B51-954E-F32DF9617D9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.10.0:b1:*:*:*:*:*:*",
"matchCriteriaId": "2B953804-C53B-4C77-AAE4-C60961C23A39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.10.0:b2:*:*:*:*:*:*",
"matchCriteriaId": "51BBFF21-4E77-44EC-B472-6925904772AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.10.0:p1:*:*:*:*:*:*",
"matchCriteriaId": "8FAA10DC-71AC-4E56-900A-B69B24917DE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.10.0:p2:*:*:*:*:*:*",
"matchCriteriaId": "9A0C5E26-B896-449D-B004-337C9C0C40F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.10.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "444326E3-9D0D-4C9F-9B86-2AB6ADE1F405",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.10.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "812CD568-82C1-4F44-99BA-1F1DF3AF16EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "16EB6777-8E49-4B07-B859-06D0C2F29DC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.10.1:b1:*:*:*:*:*:*",
"matchCriteriaId": "A2574190-E1DC-46B9-AE82-5581960D8819",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.10.1:b2:*:*:*:*:*:*",
"matchCriteriaId": "5EB06ECC-D36F-4BE7-93BF-8B1C025298EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.10.1:p1:*:*:*:*:*:*",
"matchCriteriaId": "54E5A7DC-D432-470A-B95A-AF8EE1ECB561",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.10.1:p2:*:*:*:*:*:*",
"matchCriteriaId": "A6F3181D-BB94-4700-A66C-8503B7B4107C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.10.1:rc1:*:*:*:*:*:*",
"matchCriteriaId": "8EB2A5D6-DEDF-4962-8117-2F1FADB5B984",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.10.1:rc2:*:*:*:*:*:*",
"matchCriteriaId": "26B6584A-707A-463C-BB2F-1D663FE50C01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.10.2:b1:*:*:*:*:*:*",
"matchCriteriaId": "D35C161A-3CCC-4FFC-9698-98FAE71BBF2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.10.2:p1:*:*:*:*:*:*",
"matchCriteriaId": "6518FD7D-0249-4793-9531-E5338EEC4C7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.10.2:p2:*:*:*:*:*:*",
"matchCriteriaId": "D468B433-D785-4A5B-A8CC-B2F1B27BAB7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.10.2:p3:*:*:*:*:*:*",
"matchCriteriaId": "7BCF9BD9-F557-408C-9CD7-BD0EAD66366F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.10.2:p4:*:*:*:*:*:*",
"matchCriteriaId": "407F36C2-886C-48A7-A3AB-E5F9194775D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.10.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "24CEA3F3-C4F8-4BD1-92EA-AC1B54A3CFE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.10.2:rc2:*:*:*:*:*:*",
"matchCriteriaId": "574C2F69-C5A0-48C6-8F13-C164518B8ED8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "40BD4A8C-785C-4460-AB52-B249C5DC9BC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.10.3:b1:*:*:*:*:*:*",
"matchCriteriaId": "6AAE7145-F1BA-4BEA-841E-DEE08891A3D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.10.3:p1:*:*:*:*:*:*",
"matchCriteriaId": "88359A5D-CE32-4920-BE5D-98EC262B41EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.10.3:p2:*:*:*:*:*:*",
"matchCriteriaId": "B77760E4-57C5-4A5E-A169-C84409930757",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.10.3:p3:*:*:*:*:*:*",
"matchCriteriaId": "24E9CBCA-241C-4EF6-8C0C-FA32E81B8B7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.10.3:p4:*:*:*:*:*:*",
"matchCriteriaId": "26660046-EF34-4D58-9873-97819ECDD196",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.10.3:rc1:*:*:*:*:*:*",
"matchCriteriaId": "893ACAAC-406E-4A1C-970B-A15B42961271",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.10.4:p2:*:*:*:*:*:*",
"matchCriteriaId": "E253BD9F-25B8-42E7-BEAB-E843381ED155",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.10.4:p3:*:*:*:*:*:*",
"matchCriteriaId": "6B5E42E5-27C6-4D6F-B7DC-903B10BF2017",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.11.0:a1:*:*:*:*:*:*",
"matchCriteriaId": "D72B0718-8054-4C8C-8FAF-0DC79C3B4D4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.11.0:a2:*:*:*:*:*:*",
"matchCriteriaId": "4F155EC7-B84E-4C05-908A-BFBAF2CE612D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.11.0:a3:*:*:*:*:*:*",
"matchCriteriaId": "C6C3D04E-B352-4124-A8A5-68AA90EC95DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.11.0:b1:*:*:*:*:*:*",
"matchCriteriaId": "E053C268-5C5F-4ED4-91CF-F8F795185C25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.11.0:b2:*:*:*:*:*:*",
"matchCriteriaId": "ED1A5978-3E4E-4E1C-9D45-8AFA65704F37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.11.0:b3:*:*:*:*:*:*",
"matchCriteriaId": "EF7673FD-B816-45D5-82DD-D2BD0261D2AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.11.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "1ADDCEF4-E744-4F78-B4CC-1C9278167F29",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hp:hp-ux:11.31:*:*:*:*:*:*:*",
"matchCriteriaId": "0FC82871-E47F-4431-AAE0-A714D7D22670",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:oracle:solaris:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FC633250-EB1E-4484-9BCB-977C8F9EB0B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*",
"matchCriteriaId": "79A602C5-61FE-47BA-9786-F045B6C6DBA8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "buffer.c in named in ISC BIND 9 before 9.9.9-P3, 9.10.x before 9.10.4-P3, and 9.11.x before 9.11.0rc3 does not properly construct responses, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted query."
},
{
"lang": "es",
"value": "buffer.c en named en ISC BIND 9 en versiones anteriores a 9.9.9-P3, 9.10.x en versiones anteriores a 9.10.4-P3 y 9.11.x en versiones anteriores a 9.11.0rc3 no construye respuestas adecuadamente, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (fallo de aserci\u00f3n y salida de demonio) a trav\u00e9s de una consulta manipulada."
}
],
"id": "CVE-2016-2776",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2016-09-28T10:59:00.157",
"references": [
{
"source": "cve@mitre.org",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1944.html"
},
{
"source": "cve@mitre.org",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1945.html"
},
{
"source": "cve@mitre.org",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2099.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/93188"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id/1036903"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05321107"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://kb.isc.org/article/AA-01419/0"
},
{
"source": "cve@mitre.org",
"url": "https://kb.isc.org/article/AA-01435"
},
{
"source": "cve@mitre.org",
"url": "https://kb.isc.org/article/AA-01436"
},
{
"source": "cve@mitre.org",
"url": "https://kb.isc.org/article/AA-01438"
},
{
"source": "cve@mitre.org",
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:28.bind.asc"
},
{
"source": "cve@mitre.org",
"url": "https://security.gentoo.org/glsa/201610-07"
},
{
"source": "cve@mitre.org",
"url": "https://security.netapp.com/advisory/ntap-20160930-0001/"
},
{
"source": "cve@mitre.org",
"url": "https://www.exploit-db.com/exploits/40453/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1944.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1945.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2099.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/93188"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id/1036903"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05321107"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://kb.isc.org/article/AA-01419/0"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://kb.isc.org/article/AA-01435"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://kb.isc.org/article/AA-01436"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://kb.isc.org/article/AA-01438"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:28.bind.asc"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.gentoo.org/glsa/201610-07"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.netapp.com/advisory/ntap-20160930-0001/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.exploit-db.com/exploits/40453/"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…