7.8 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
5.9 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
7.8 High
AI Score
Confidence
High
0.972 High
EPSS
Percentile
99.8%
Debian Security Advisory DSA-3680-1 [email protected]
https://www.debian.org/security/ Florian Weimer
September 27, 2016 https://www.debian.org/security/faq
Package : bind9
CVE ID : CVE-2016-2775 CVE-2016-2776
Debian Bug : 831796 839010
Two vulnerabilities were reported in BIND, a DNS server.
CVE-2016-2775
The lwresd component in BIND (which is not enabled by default)
could crash while processing an overlong request name. This could
lead to a denial of service.
CVE-2016-2776
A crafted query could crash the BIND name server daemon, leading
to a denial of service. All server roles (authoritative,
recursive and forwarding) in default configurations are are
affected.
For the stable distribution (jessie), these problems have been fixed in
version 1:9.9.5.dfsg-9+deb8u7.
We recommend that you upgrade your bind9 packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 8 | all | host | < 1:9.9.5.dfsg-9+deb8u7 | host_1:9.9.5.dfsg-9+deb8u7_all.deb |
Debian | 8 | ppc64el | lwresd | < 1:9.9.5.dfsg-9+deb8u7 | lwresd_1:9.9.5.dfsg-9+deb8u7_ppc64el.deb |
Debian | 8 | powerpc | bind9utils | < 1:9.9.5.dfsg-9+deb8u7 | bind9utils_1:9.9.5.dfsg-9+deb8u7_powerpc.deb |
Debian | 8 | all | bind9-doc | < 1:9.9.5.dfsg-9+deb8u7 | bind9-doc_1:9.9.5.dfsg-9+deb8u7_all.deb |
Debian | 7 | armel | libisccfg82 | < 1:9.8.4.dfsg.P1-6+nmu2+deb7u11 | libisccfg82_1:9.8.4.dfsg.P1-6+nmu2+deb7u11_armel.deb |
Debian | 8 | i386 | dnsutils | < 1:9.9.5.dfsg-9+deb8u7 | dnsutils_1:9.9.5.dfsg-9+deb8u7_i386.deb |
Debian | 8 | kfreebsd-i386 | libdns-export100 | < 1:9.9.5.dfsg-9+deb8u7 | libdns-export100_1:9.9.5.dfsg-9+deb8u7_kfreebsd-i386.deb |
Debian | 8 | kfreebsd-i386 | lwresd | < 1:9.9.5.dfsg-9+deb8u7 | lwresd_1:9.9.5.dfsg-9+deb8u7_kfreebsd-i386.deb |
Debian | 8 | powerpc | libirs-export91-udeb | < 1:9.9.5.dfsg-9+deb8u7 | libirs-export91-udeb_1:9.9.5.dfsg-9+deb8u7_powerpc.deb |
Debian | 8 | kfreebsd-i386 | libisc95 | < 1:9.9.5.dfsg-9+deb8u7 | libisc95_1:9.9.5.dfsg-9+deb8u7_kfreebsd-i386.deb |
7.8 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
5.9 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
7.8 High
AI Score
Confidence
High
0.972 High
EPSS
Percentile
99.8%