Vulnerability Description
resolver.c in named in ISC BIND 9.10.x before 9.10.3-P4, when DNS cookies are enabled, allows remote attackers to cause a denial of service (INSIST assertion failure and daemon exit) via a malformed packet with more than one cookie option.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Isc | Bind | 9.10.0 |
Related Weaknesses (CWE)
References
- http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181036.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178831.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179904.html
- http://www.securityfocus.com/bid/84290
- http://www.securitytracker.com/id/1035238
- https://kb.isc.org/article/AA-01351Vendor Advisory
- https://kb.isc.org/article/AA-01380
- https://security.gentoo.org/glsa/201610-07
- http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181036.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178831.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179904.html
- http://www.securityfocus.com/bid/84290
- http://www.securitytracker.com/id/1035238
- https://kb.isc.org/article/AA-01351Vendor Advisory
- https://kb.isc.org/article/AA-01380
FAQ
What is CVE-2016-2088?
CVE-2016-2088 is a vulnerability with a CVSS score of 6.8 (MEDIUM). resolver.c in named in ISC BIND 9.10.x before 9.10.3-P4, when DNS cookies are enabled, allows remote attackers to cause a denial of service (INSIST assertion failure and daemon exit) via a malformed p...
How severe is CVE-2016-2088?
CVE-2016-2088 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-2088?
Check the references section above for vendor advisories and patch information. Affected products include: Isc Bind.