First published: Tue Jul 19 2016(Updated: )
ISC BIND 9.x before 9.9.9-P2, 9.10.x before 9.10.4-P2, and 9.11.x before 9.11.0b2, when lwresd or the named lwres option is enabled, allows remote attackers to cause a denial of service (daemon crash) via a long request that uses the lightweight resolver protocol.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/bind | <9.9.9 | 9.9.9 |
redhat/bind | <9.10.4 | 9.10.4 |
redhat/bind | <9.11.0 | 9.11.0 |
HPE HP-UX | =b.11.31 | |
ISC BIND 9 | >=9.0<=9.9.8 | |
ISC BIND 9 | >=9.10.0<=9.10.3 | |
ISC BIND 9 | =9.9.9 | |
ISC BIND 9 | =9.9.9-b1 | |
ISC BIND 9 | =9.9.9-b2 | |
ISC BIND 9 | =9.9.9-p1 | |
ISC BIND 9 | =9.9.9-rc1 | |
ISC BIND 9 | =9.9.9-s1 | |
ISC BIND 9 | =9.9.9-s1rc1 | |
ISC BIND 9 | =9.10.4 | |
ISC BIND 9 | =9.10.4-beta1 | |
ISC BIND 9 | =9.10.4-beta2 | |
ISC BIND 9 | =9.10.4-beta3 | |
ISC BIND 9 | =9.10.4-p1 | |
ISC BIND 9 | =9.11.0 | |
ISC BIND 9 | =9.11.0-alpha1 | |
ISC BIND 9 | =9.11.0-alpha2 | |
ISC BIND 9 | =9.11.0-alpha3 | |
ISC BIND 9 | =9.11.0-beta1 | |
Fedora | =23 | |
Fedora | =24 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server EUS | =7.2 | |
Red Hat Enterprise Linux Server EUS | =7.3 | |
Red Hat Enterprise Linux Server EUS | =7.4 | |
Red Hat Enterprise Linux Server EUS | =7.5 | |
Red Hat Enterprise Linux Server EUS | =7.6 | |
Red Hat Enterprise Linux Server EUS | =7.7 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =7.2 | |
Red Hat Enterprise Linux Server | =7.3 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Server | =7.7 | |
Red Hat Enterprise Linux Server | =7.2 | |
Red Hat Enterprise Linux Server | =7.3 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Server | =7.7 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Red Hat Enterprise Linux Workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2775 has a severity level classified as High due to its potential to allow remote denial of service.
To fix CVE-2016-2775, update ISC BIND to version 9.9.9-P2, 9.10.4-P2, or 9.11.0b2 or later.
CVE-2016-2775 affects ISC BIND versions prior to 9.9.9-P2, 9.10.4-P2, and 9.11.0b2.
An attacker can exploit CVE-2016-2775 by sending a long request using the lightweight resolver protocol to cause a daemon crash.
A potential workaround for CVE-2016-2775 is to disable the lwresd or the named lwres option if not needed.