Unknown
CVE-2016-1285
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2016-1285
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 does not properly handle DNAME records when parsing fetch reply messages, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed packet to the rndc (aka control channel) interface, related to alist.c and sexpr.c.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
- canonical,
- debian,
- fedoraproject,
- isc,
- juniper,
- opensuse,
- suse
Products
- bind,
- bind 9.10.3,
- bind 9.9.8,
- debian linux 7.0,
- debian linux 8.0,
- debian linux 9.0,
- fedora 22,
- fedora 23,
- fedora 24,
- junos 12.1x46,
- junos 12.1x46-d10,
- junos 12.1x46-d76,
- junos 12.3x48,
- junos 15.1x49,
- junos 17.3,
- junos 17.4,
- junos 18.1,
- junos 18.2,
- junos 18.3,
- junos 18.4,
- leap 42.1,
- linux enterprise debuginfo 11,
- linux enterprise desktop 11,
- linux enterprise desktop 12,
- linux enterprise server 11,
- linux enterprise server 12,
- linux enterprise software development kit 11,
- linux enterprise software development kit 12,
- manager 2.1,
- manager proxy 2.1,
- openstack cloud 5,
- opensuse 11.4,
- opensuse 13.1,
- opensuse 13.2,
- ubuntu linux 12.04,
- ubuntu linux 14.04,
- ubuntu linux 15.10
References
Advisory
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: