2016-10-31
ALT-BU-2016-3106-1
Branch p6 update bulletin.
Closed vulnerabilities
Published: 2016-09-28
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2016-2776
buffer.c in named in ISC BIND 9 before 9.9.9-P3, 9.10.x before 9.10.4-P3, and 9.11.x before 9.11.0rc3 does not properly construct responses, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted query.
Severity: HIGH (7.5)
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
References:
- RHSA-2016:1944
- RHSA-2016:1944
- RHSA-2016:1945
- RHSA-2016:1945
- RHSA-2016:2099
- RHSA-2016:2099
- http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
- 93188
- 93188
- 1036903
- 1036903
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05321107
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05321107
- https://kb.isc.org/article/AA-01419/0
- https://kb.isc.org/article/AA-01419/0
- https://kb.isc.org/article/AA-01435
- https://kb.isc.org/article/AA-01435
- https://kb.isc.org/article/AA-01436
- https://kb.isc.org/article/AA-01436
- https://kb.isc.org/article/AA-01438
- https://kb.isc.org/article/AA-01438
- FreeBSD-SA-16:28
- FreeBSD-SA-16:28
- GLSA-201610-07
- GLSA-201610-07
- https://security.netapp.com/advisory/ntap-20160930-0001/
- https://security.netapp.com/advisory/ntap-20160930-0001/
- 40453
- 40453
Published: 2016-10-21
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2016-2848
ISC BIND 9.1.0 through 9.8.4-P2 and 9.9.0 through 9.9.2-P2 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via malformed options data in an OPT resource record.
Severity: HIGH (7.5)
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
References:
- RHSA-2016:2093
- RHSA-2016:2093
- RHSA-2016:2094
- RHSA-2016:2094
- RHSA-2016:2099
- RHSA-2016:2099
- 93809
- 93809
- 93814
- 93814
- 1037073
- 1037073
- https://bugzilla.redhat.com/show_bug.cgi?id=1385450
- https://bugzilla.redhat.com/show_bug.cgi?id=1385450
- https://kb.isc.org/article/AA-01433/74/CVE-2016-2848
- https://kb.isc.org/article/AA-01433/74/CVE-2016-2848
- https://security.netapp.com/advisory/ntap-20180926-0002/
- https://security.netapp.com/advisory/ntap-20180926-0002/
- https://security.netapp.com/advisory/ntap-20180926-0005/
- https://security.netapp.com/advisory/ntap-20180926-0005/
- https://source.isc.org/cgi-bin/gitweb.cgi?p=bind9.git%3Ba=commit%3Bh=4adf97c32fcca7d00e5756607fd045f2aab9c3d4
- https://source.isc.org/cgi-bin/gitweb.cgi?p=bind9.git%3Ba=commit%3Bh=4adf97c32fcca7d00e5756607fd045f2aab9c3d4