CVE-2016-8864
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
02/11/2016
Last modified:
12/04/2025
Description
named in ISC BIND 9.x before 9.9.9-P4, 9.10.x before 9.10.4-P4, and 9.11.x before 9.11.0-P1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a DNAME record in the answer section of a response to a recursive query, related to db.c and resolver.c.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:* | 9.0.0 (including) | 9.9.9 (excluding) |
| cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:* | 9.10.0 (including) | 9.10.4 (excluding) |
| cpe:2.3:a:isc:bind:9.9.9:-:*:*:*:*:*:* | ||
| cpe:2.3:a:isc:bind:9.9.9:beta1:*:*:*:*:*:* | ||
| cpe:2.3:a:isc:bind:9.9.9:beta2:*:*:*:*:*:* | ||
| cpe:2.3:a:isc:bind:9.9.9:p1:*:*:*:*:*:* | ||
| cpe:2.3:a:isc:bind:9.9.9:p2:*:*:*:*:*:* | ||
| cpe:2.3:a:isc:bind:9.9.9:p3:*:*:*:*:*:* | ||
| cpe:2.3:a:isc:bind:9.10.4:-:*:*:*:*:*:* | ||
| cpe:2.3:a:isc:bind:9.10.4:beta1:*:*:*:*:*:* | ||
| cpe:2.3:a:isc:bind:9.10.4:beta2:*:*:*:*:*:* | ||
| cpe:2.3:a:isc:bind:9.10.4:beta3:*:*:*:*:*:* | ||
| cpe:2.3:a:isc:bind:9.10.4:p1:*:*:*:*:*:* | ||
| cpe:2.3:a:isc:bind:9.10.4:p2:*:*:*:*:*:* | ||
| cpe:2.3:a:isc:bind:9.10.4:p3:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://rhn.redhat.com/errata/RHSA-2016-2141.html
- http://rhn.redhat.com/errata/RHSA-2016-2142.html
- http://rhn.redhat.com/errata/RHSA-2016-2615.html
- http://rhn.redhat.com/errata/RHSA-2016-2871.html
- http://www.debian.org/security/2016/dsa-3703
- http://www.securityfocus.com/bid/94067
- http://www.securitytracker.com/id/1037156
- https://access.redhat.com/errata/RHSA-2017:1583
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05381687
- https://kb.isc.org/article/AA-01434
- https://kb.isc.org/article/AA-01435
- https://kb.isc.org/article/AA-01436
- https://kb.isc.org/article/AA-01437
- https://kb.isc.org/article/AA-01438
- https://security.FreeBSD.org/advisories/FreeBSD-SA-16:34.bind.asc
- https://security.gentoo.org/glsa/201701-26
- https://security.netapp.com/advisory/ntap-20180926-0005/
- http://rhn.redhat.com/errata/RHSA-2016-2141.html
- http://rhn.redhat.com/errata/RHSA-2016-2142.html
- http://rhn.redhat.com/errata/RHSA-2016-2615.html
- http://rhn.redhat.com/errata/RHSA-2016-2871.html
- http://www.debian.org/security/2016/dsa-3703
- http://www.securityfocus.com/bid/94067
- http://www.securitytracker.com/id/1037156
- https://access.redhat.com/errata/RHSA-2017:1583
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05381687
- https://kb.isc.org/article/AA-01434
- https://kb.isc.org/article/AA-01435
- https://kb.isc.org/article/AA-01436
- https://kb.isc.org/article/AA-01437
- https://kb.isc.org/article/AA-01438
- https://security.FreeBSD.org/advisories/FreeBSD-SA-16:34.bind.asc
- https://security.gentoo.org/glsa/201701-26
- https://security.netapp.com/advisory/ntap-20180926-0005/



