5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
0.873 High
EPSS
Percentile
98.7%
Severity: High
Date : 2017-01-12
CVE-ID : CVE-2016-9131 CVE-2016-9147 CVE-2016-9444 CVE-2016-9778
Package : bind
Type : denial of service
Remote : Yes
Link : https://security.archlinux.org/AVG-132
The package bind before version 9.11.0.P2-1 is vulnerable to denial of
service.
Upgrade to 9.11.0.P2-1.
The problems have been fixed upstream in version 9.11.0.P2.
None
A denial of service flaw was found in the way BIND processed a response
to an ANY query. A remote attacker could use this flaw to make named
exit unexpectedly with an assertion failure via a specially crafted DNS
response.
A denial of service flaw was found in the way BIND handled a query
response containing inconsistent DNSSEC information. A remote attacker
could use this flaw to make named exit unexpectedly with an assertion
failure via a specially crafted DNS response.
A denial of service flaw was found in the way BIND handled an
unusually-formed DS record response. A remote attacker could use this
flaw to make named exit unexpectedly with an assertion failure via a
specially crafted DNS response.
A denial of service flaw was found in the way BIND handled certain
queries using the nxdomain-redirect feature to cover a zone for which
it is also providing authoritative service. A remote attacker could use
this flaw to make named exit unexpectedly with an assertion failure via
a specially crafted DNS response.
A remote attacker can crash the server by performing crafted queries
under certain circumstances.
https://kb.isc.org/article/AA-01439/0
https://kb.isc.org/article/AA-01440/0
https://kb.isc.org/article/AA-01441/0
https://kb.isc.org/article/AA-01442/0
https://security.archlinux.org/CVE-2016-9131
https://security.archlinux.org/CVE-2016-9147
https://security.archlinux.org/CVE-2016-9444
https://security.archlinux.org/CVE-2016-9778
5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
0.873 High
EPSS
Percentile
98.7%