First published: Mon Jan 09 2017(Updated: )
named in ISC BIND 9.x before 9.9.9-P5, 9.10.x before 9.10.4-P5, and 9.11.x before 9.11.0-P2 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed response to an RTYPE ANY query.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
BIND 9 | >=9.0<=9.9.8 | |
BIND 9 | >=9.10.0<=9.10.3 | |
BIND 9 | =9.9.9 | |
BIND 9 | =9.9.9-b1 | |
BIND 9 | =9.9.9-b2 | |
BIND 9 | =9.9.9-p1 | |
BIND 9 | =9.9.9-p3 | |
BIND 9 | =9.9.9-p4 | |
BIND 9 | =9.10.4-b2 | |
BIND 9 | =9.10.4-b3 | |
BIND 9 | =9.10.4-p2 | |
BIND 9 | =9.10.4-p3 | |
BIND 9 | =9.10.4-p4 | |
BIND 9 | =9.10.4-rc1 | |
BIND 9 | =9.11.0-a1 | |
BIND 9 | =9.11.0-a2 | |
BIND 9 | =9.11.0-a3 | |
BIND 9 | =9.11.0-b1 | |
BIND 9 | =9.11.0-b2 | |
BIND 9 | =9.11.0-b3 | |
BIND 9 | =9.11.0-p1 | |
BIND 9 | =9.11.0-rc1 | |
Debian GNU/Linux | =8.0 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux eus | =7.2 | |
redhat enterprise Linux eus | =7.3 | |
redhat enterprise Linux eus | =7.4 | |
redhat enterprise Linux eus | =7.5 | |
redhat enterprise Linux eus | =7.6 | |
redhat enterprise Linux eus | =7.7 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =7.2 | |
redhat enterprise Linux server aus | =7.3 | |
redhat enterprise Linux server aus | =7.4 | |
redhat enterprise Linux server aus | =7.6 | |
redhat enterprise Linux server aus | =7.7 | |
redhat enterprise Linux server tus | =7.2 | |
redhat enterprise Linux server tus | =7.3 | |
redhat enterprise Linux server tus | =7.6 | |
redhat enterprise Linux server tus | =7.7 | |
Red Hat Enterprise Linux Server Workstation | =7.0 | |
NetApp Data ONTAP Edge | ||
netapp hci management node | ||
netapp solidfire | ||
NetApp SteelStore |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9131 has a severity rating of critical due to its potential for remote denial of service attacks.
To fix CVE-2016-9131, upgrade your ISC BIND to the latest version that is not affected, such as versions 9.9.9-P5, 9.10.4-P5, or 9.11.0-P2 and above.
CVE-2016-9131 affects ISC BIND versions prior to 9.9.9-P5, 9.10.4-P5, and 9.11.0-P2.
Yes, CVE-2016-9131 can be exploited remotely by attackers sending malformed responses to RTYPE ANY queries.
CVE-2016-9131 can cause an assertion failure resulting in the BIND daemon crashing, leading to a denial of service.