Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-2088

Опубликовано: 09 мар. 2016
Источник: redhat
CVSS2: 5
EPSS Средний

Описание

resolver.c in named in ISC BIND 9.10.x before 9.10.3-P4, when DNS cookies are enabled, allows remote attackers to cause a denial of service (INSIST assertion failure and daemon exit) via a malformed packet with more than one cookie option.

Отчет

This issue did not affect the versions of bind97 as shipped with Red Hat Enterprise Linux 5 and bind as shipped with Red Hat Enterprise Linux 5, 6, and 7 as they did not include support for DNS cookies.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 4bindNot affected
Red Hat Enterprise Linux 5bindNot affected
Red Hat Enterprise Linux 5bind97Not affected
Red Hat Enterprise Linux 6bindNot affected
Red Hat Enterprise Linux 7bindNot affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-617
https://bugzilla.redhat.com/show_bug.cgi?id=1315690bind: malformed packet containing multiple cookie options can trigger assertion failure

EPSS

Процентиль: 98%
0.48562
Средний

5 Medium

CVSS2

Связанные уязвимости

CVSS3: 6.8
ubuntu
почти 10 лет назад

resolver.c in named in ISC BIND 9.10.x before 9.10.3-P4, when DNS cookies are enabled, allows remote attackers to cause a denial of service (INSIST assertion failure and daemon exit) via a malformed packet with more than one cookie option.

CVSS3: 6.8
nvd
почти 10 лет назад

resolver.c in named in ISC BIND 9.10.x before 9.10.3-P4, when DNS cookies are enabled, allows remote attackers to cause a denial of service (INSIST assertion failure and daemon exit) via a malformed packet with more than one cookie option.

CVSS3: 6.8
debian
почти 10 лет назад

resolver.c in named in ISC BIND 9.10.x before 9.10.3-P4, when DNS cook ...

CVSS3: 6.8
github
больше 3 лет назад

resolver.c in named in ISC BIND 9.10.x before 9.10.3-P4, when DNS cookies are enabled, allows remote attackers to cause a denial of service (INSIST assertion failure and daemon exit) via a malformed packet with more than one cookie option.

fstec
почти 10 лет назад

Уязвимость сервера DNS BIND, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 98%
0.48562
Средний

5 Medium

CVSS2