CVE-2016-1284

Published on: 02/04/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:05 PM UTC

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

Certain versions of Bind from Isc contain the following vulnerability:

rdataset.c in ISC BIND 9 Supported Preview Edition 9.9.8-S before 9.9.8-S5, when nxdomain-redirect is enabled, allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via crafted flag values in a query.

  • CVE-2016-1284 has been assigned by [email protected] to track the vulnerability - currently rated as MEDIUM severity.

CVSS3 Score: 5.9 - MEDIUM

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK HIGH NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED NONE NONE HIGH

CVSS2 Score: 2.6 - LOW

Access
Vector
Access
Complexity
Authentication
NETWORK HIGH NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
NONE NONE PARTIAL

CVE References

Description Tags Link
404 Page not found Release Notes
kb.isc.org
text/html
Inactive LinkNot Archived
URL Logo CONFIRM kb.isc.org/article/AA-01438
CVE-2016-1284: A REQUIRE assertion failure in rdataset.c can be deliberately triggered in servers performing NXDOMAIN redirection. | Internet Systems Consortium Knowledge Base Vendor Advisory
kb.isc.org
text/html
URL Logo CONFIRM kb.isc.org/article/AA-01348
BIND NXDOMAIN Redirection Processing Bug Lets Remote Users Cause the Target Service to Crash - SecurityTracker www.securitytracker.com
text/html
URL Logo SECTRACK 1034935

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationIscBind9.9.8s1AllAll
ApplicationIscBind9.9.8s2AllAll
ApplicationIscBind9.9.8s3AllAll
ApplicationIscBind9.9.8s4AllAll
ApplicationIscBind9.9.8s1AllAll
ApplicationIscBind9.9.8s2AllAll
ApplicationIscBind9.9.8s3AllAll
ApplicationIscBind9.9.8s4AllAll
  • cpe:2.3:a:isc:bind:9.9.8:s1:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.9.8:s2:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.9.8:s3:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.9.8:s4:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.9.8:s1:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.9.8:s2:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.9.8:s3:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.9.8:s4:*:*:*:*:*:*: