First published: Fri Oct 28 2016(Updated: )
A defect in BIND's handling of responses containing a DNAME answer can cause a resolver to exit after encountering an assertion failure in db.c or resolver.c During processing of a recursive response that contains a DNAME record in the answer section, BIND can stop execution after encountering an assertion error in resolver.c (error message: "INSIST((valoptions & 0x0002U) != 0) failed") or db.c (error message: "REQUIRE(targetp != ((void *)0) && *targetp == ((void *)0)) failed"). A server encountering either of these error conditions will stop, resulting in denial of service to clients. The risk to authoritative servers is minimal; recursive servers are chiefly at risk.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/bind9 | 1:9.11.5.P4+dfsg-5.1+deb10u7 1:9.11.5.P4+dfsg-5.1+deb10u9 1:9.16.44-1~deb11u1 1:9.18.19-1~deb12u1 1:9.19.17-1 | |
ISC BIND | >=9.0.0<9.9.9 | |
ISC BIND | >=9.10.0<9.10.4 | |
ISC BIND | =9.9.9 | |
ISC BIND | =9.9.9-beta1 | |
ISC BIND | =9.9.9-beta2 | |
ISC BIND | =9.9.9-p1 | |
ISC BIND | =9.9.9-p2 | |
ISC BIND | =9.9.9-p3 | |
ISC BIND | =9.10.4 | |
ISC BIND | =9.10.4-beta1 | |
ISC BIND | =9.10.4-beta2 | |
ISC BIND | =9.10.4-beta3 | |
ISC BIND | =9.10.4-p1 | |
ISC BIND | =9.10.4-p2 | |
ISC BIND | =9.10.4-p3 | |
ISC BIND | =9.11.0 | |
ISC BIND | =9.11.0-alpha1 | |
ISC BIND | =9.11.0-alpha2 | |
ISC BIND | =9.11.0-alpha3 | |
ISC BIND | =9.11.0-beta1 | |
ISC BIND | =9.11.0-beta2 | |
ISC BIND | =9.11.0-beta3 | |
netapp data ontap edge | ||
netapp solidfire | ||
netapp steelstore cloud integrated storage | ||
redhat enterprise Linux desktop | =5.0 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux eus | =6.7 | |
redhat enterprise Linux eus | =7.2 | |
redhat enterprise Linux eus | =7.3 | |
redhat enterprise Linux eus | =7.4 | |
redhat enterprise Linux eus | =7.5 | |
redhat enterprise Linux eus | =7.6 | |
redhat enterprise Linux eus | =7.7 | |
redhat enterprise Linux server | =5.0 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =6.2 | |
redhat enterprise Linux server aus | =6.4 | |
redhat enterprise Linux server aus | =6.5 | |
redhat enterprise Linux server aus | =6.6 | |
redhat enterprise Linux server aus | =7.2 | |
redhat enterprise Linux server aus | =7.3 | |
redhat enterprise Linux server aus | =7.4 | |
redhat enterprise Linux server aus | =7.6 | |
redhat enterprise Linux server aus | =7.7 | |
redhat enterprise Linux server tus | =6.5 | |
redhat enterprise Linux server tus | =6.6 | |
redhat enterprise Linux server tus | =7.2 | |
redhat enterprise Linux server tus | =7.3 | |
redhat enterprise Linux server tus | =7.6 | |
redhat enterprise Linux server tus | =7.7 | |
redhat enterprise Linux workstation | =5.0 | |
redhat enterprise Linux workstation | =6.0 | |
redhat enterprise Linux workstation | =7.0 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.