CVE-2016-2088

Published on: 03/09/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:15 PM UTC

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H

Certain versions of Bind from Isc contain the following vulnerability:

resolver.c in named in ISC BIND 9.10.x before 9.10.3-P4, when DNS cookies are enabled, allows remote attackers to cause a denial of service (INSIST assertion failure and daemon exit) via a malformed packet with more than one cookie option.

  • CVE-2016-2088 has been assigned by [email protected] to track the vulnerability - currently rated as MEDIUM severity.

CVSS3 Score: 6.8 - MEDIUM

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK HIGH NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
CHANGED NONE NONE HIGH

CVSS2 Score: 4.3 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK MEDIUM NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
NONE NONE PARTIAL

CVE References

Description Tags Link
[SECURITY] Fedora 24 Update: bind-9.10.3-12.P4.fc24 lists.fedoraproject.org
text/html
URL Logo FEDORA FEDORA-2016-75f31fbb0a
BIND DNS Cookie Processing Flaw Lets Remote Users Cause the Target Service to Crash - SecurityTracker www.securitytracker.com
text/html
URL Logo SECTRACK 1035238
ISC BIND CVE-2016-2088 Remote Denial of Service Vulnerability cve.report (archive)
text/html
URL Logo BID 84290
BIND 9.10.4 Release Notes | Internet Systems Consortium Knowledge Base web.archive.org
text/html
Inactive LinkNot Archived
URL Logo CONFIRM kb.isc.org/article/AA-01380
CVE-2016-2088: A response containing multiple DNS cookies causes servers with cookie support enabled to exit with an assertion failure. | Internet Systems Consortium Knowledge Base Vendor Advisory
kb.isc.org
text/html
URL Logo CONFIRM kb.isc.org/article/AA-01351
[SECURITY] Fedora 23 Update: bind-9.10.3-12.P4.fc23 lists.fedoraproject.org
text/html
URL Logo FEDORA FEDORA-2016-b593e84223
[SECURITY] Fedora 22 Update: bind-9.10.3-9.P4.fc22 lists.fedoraproject.org
text/html
URL Logo FEDORA FEDORA-2016-364c0a9df4
BIND: Multiple vulnerabilities (GLSA 201610-07) — Gentoo Security security.gentoo.org
text/html
URL Logo GENTOO GLSA-201610-07

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationIscBind9.10.0AllAllAll
ApplicationIscBind9.10.0a1AllAll
ApplicationIscBind9.10.0a2AllAll
ApplicationIscBind9.10.0b1AllAll
ApplicationIscBind9.10.0b2AllAll
ApplicationIscBind9.10.0p1AllAll
ApplicationIscBind9.10.0p2AllAll
ApplicationIscBind9.10.0rc1AllAll
ApplicationIscBind9.10.0rc2AllAll
ApplicationIscBind9.10.1AllAllAll
ApplicationIscBind9.10.1b1AllAll
ApplicationIscBind9.10.1b2AllAll
ApplicationIscBind9.10.1p1AllAll
ApplicationIscBind9.10.1p2AllAll
ApplicationIscBind9.10.1rc1AllAll
ApplicationIscBind9.10.1rc2AllAll
ApplicationIscBind9.10.2b1AllAll
ApplicationIscBind9.10.2p1AllAll
ApplicationIscBind9.10.2p2AllAll
ApplicationIscBind9.10.2p3AllAll
ApplicationIscBind9.10.2p4AllAll
ApplicationIscBind9.10.2rc1AllAll
ApplicationIscBind9.10.2rc2AllAll
ApplicationIscBind9.10.3AllAllAll
ApplicationIscBind9.10.3b1AllAll
ApplicationIscBind9.10.3p1AllAll
ApplicationIscBind9.10.3p2AllAll
ApplicationIscBind9.10.3p3AllAll
ApplicationIscBind9.10.3rc1AllAll
ApplicationIscBind9.10.0AllAllAll
ApplicationIscBind9.10.0a1AllAll
ApplicationIscBind9.10.0a2AllAll
ApplicationIscBind9.10.0b1AllAll
ApplicationIscBind9.10.0b2AllAll
ApplicationIscBind9.10.0p1AllAll
ApplicationIscBind9.10.0p2AllAll
ApplicationIscBind9.10.0rc1AllAll
ApplicationIscBind9.10.0rc2AllAll
ApplicationIscBind9.10.1AllAllAll
ApplicationIscBind9.10.1b1AllAll
ApplicationIscBind9.10.1b2AllAll
ApplicationIscBind9.10.1p1AllAll
ApplicationIscBind9.10.1p2AllAll
ApplicationIscBind9.10.1rc1AllAll
ApplicationIscBind9.10.1rc2AllAll
ApplicationIscBind9.10.2b1AllAll
ApplicationIscBind9.10.2p1AllAll
ApplicationIscBind9.10.2p2AllAll
ApplicationIscBind9.10.2p3AllAll
ApplicationIscBind9.10.2p4AllAll
ApplicationIscBind9.10.2rc1AllAll
ApplicationIscBind9.10.2rc2AllAll
ApplicationIscBind9.10.3AllAllAll
ApplicationIscBind9.10.3b1AllAll
ApplicationIscBind9.10.3p1AllAll
ApplicationIscBind9.10.3p2AllAll
ApplicationIscBind9.10.3p3AllAll
ApplicationIscBind9.10.3rc1AllAll
  • cpe:2.3:a:isc:bind:9.10.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.0:a1:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.0:a2:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.0:b1:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.0:b2:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.0:p1:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.0:p2:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.0:rc1:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.0:rc2:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.1:b1:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.1:b2:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.1:p1:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.1:p2:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.1:rc1:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.1:rc2:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.2:b1:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.2:p1:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.2:p2:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.2:p3:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.2:p4:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.2:rc1:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.2:rc2:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.3:b1:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.3:p1:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.3:p2:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.3:p3:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.3:rc1:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.0:a1:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.0:a2:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.0:b1:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.0:b2:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.0:p1:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.0:p2:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.0:rc1:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.0:rc2:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.1:b1:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.1:b2:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.1:p1:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.1:p2:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.1:rc1:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.1:rc2:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.2:b1:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.2:p1:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.2:p2:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.2:p3:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.2:p4:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.2:rc1:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.2:rc2:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.3:b1:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.3:p1:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.3:p2:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.3:p3:*:*:*:*:*:*:
  • cpe:2.3:a:isc:bind:9.10.3:rc1:*:*:*:*:*:*: