MEDIUM · 6.8

CVE-2016-1285

named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 does not properly handle DNAME records when parsing fetch reply messages, which allows remote attackers to cause a denial of service (...

Vulnerability Description

named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 does not properly handle DNAME records when parsing fetch reply messages, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed packet to the rndc (aka control channel) interface, related to alist.c and sexpr.c.

CVSS Score

6.8

MEDIUM

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH

Affected Products

VendorProductVersions
IscBind>= 9.0.0, < 9.9.8
SuseLinux Enterprise Debuginfo11
SuseManager2.1
SuseManager Proxy2.1
SuseOpenstack Cloud5
OpensuseLeap42.1
OpensuseOpensuse11.4
SuseLinux Enterprise Desktop11
SuseLinux Enterprise Server11
SuseLinux Enterprise Software Development Kit11
FedoraprojectFedora22
CanonicalUbuntu Linux12.04
DebianDebian Linux7.0
JuniperJunos12.1x46
JuniperVsrx-
JuniperSrx100-
JuniperSrx110-
JuniperSrx1400-
JuniperSrx1500-
JuniperSrx1600-

References

FAQ

What is CVE-2016-1285?

CVE-2016-1285 is a vulnerability with a CVSS score of 6.8 (MEDIUM). named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 does not properly handle DNAME records when parsing fetch reply messages, which allows remote attackers to cause a denial of service (...

How severe is CVE-2016-1285?

CVE-2016-1285 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2016-1285?

Check the references section above for vendor advisories and patch information. Affected products include: Isc Bind, Suse Linux Enterprise Debuginfo, Suse Manager, Suse Manager Proxy, Suse Openstack Cloud.