CVE-2016-2088

Impact:
Important
Public Date:
2016-03-09
CWE:
CWE-617
Bugzilla:
1315690: CVE-2016-2088 bind: malformed packet containing multiple cookie options can trigger assertion failure

The MITRE CVE dictionary describes this issue as:

resolver.c in named in ISC BIND 9.10.x before 9.10.3-P4, when DNS cookies are enabled, allows remote attackers to cause a denial of service (INSIST assertion failure and daemon exit) via a malformed packet with more than one cookie option.

Find out more about CVE-2016-2088 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

This issue did not affect the versions of bind97 as shipped with Red Hat Enterprise Linux 5 and bind as shipped with Red Hat Enterprise Linux 5, 6, and 7 as they did not include support for DNS cookies.

CVSS v2 metrics

NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.

Base Score 5
Base Metrics AV:N/AC:L/Au:N/C:N/I:N/A:P
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 7 bind Not affected
Red Hat Enterprise Linux 6 bind Not affected
Red Hat Enterprise Linux 5 bind97 Not affected
Red Hat Enterprise Linux 5 bind Not affected
Red Hat Enterprise Linux 4 bind Not affected

Acknowledgements

Red Hat would like to thank ISC for reporting this issue.

External References

Last Modified

CVE description copyright © 2017, The MITRE Corporation

Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.