Vulnerability Details : CVE-2016-2776
Public exploit exists!
buffer.c in named in ISC BIND 9 before 9.9.9-P3, 9.10.x before 9.10.4-P3, and 9.11.x before 9.11.0rc3 does not properly construct responses, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted query.
Vulnerability category: Input validationDenial of service
Threat overview for CVE-2016-2776
Top countries where our scanners detected CVE-2016-2776
Top open port discovered on systems with this issue
53
IPs affected by CVE-2016-2776 66,633
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2016-2776!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2016-2776
Probability of exploitation activity in the next 30 days: 97.29%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 100 % EPSS Score History EPSS FAQ
Metasploit modules for CVE-2016-2776
-
BIND TSIG Query Denial of Service
Disclosure Date: 2016-09-27First seen: 2020-04-26auxiliary/dos/dns/bind_tsigA defect in the rendering of messages into packets can cause named to exit with an assertion failure in buffer.c while constructing a response to a query that meets certain criteria. This assertion can be triggered even if the apparent source address isn't a
CVSS scores for CVE-2016-2776
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.8
|
HIGH | AV:N/AC:L/Au:N/C:N/I:N/A:C |
10.0
|
6.9
|
NIST |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2016-2776
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-2776
-
http://www.securityfocus.com/bid/93188
ISC BIND 'buffer.c' Remote Denial of Service Vulnerability
-
https://kb.isc.org/article/AA-01419/0
CVE-2016-2776: Assertion Failure in buffer.c While Building Responses to a Specifically Constructed Request - Security AdvisoriesVendor Advisory
-
https://security.gentoo.org/glsa/201610-07
BIND: Multiple vulnerabilities (GLSA 201610-07) — Gentoo security
-
http://rhn.redhat.com/errata/RHSA-2016-1945.html
RHSA-2016:1945 - Security Advisory - Red Hat Customer Portal
-
https://kb.isc.org/article/AA-01436
404 Page not found
-
https://kb.isc.org/article/AA-01438
404 Page not found
-
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
Oracle VM Server for x86 Bulletin - October 2016Third Party Advisory
-
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
Oracle Linux Bulletin - October 2016Third Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2016-2099.html
RHSA-2016:2099 - Security Advisory - Red Hat Customer Portal
-
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:28.bind.asc
-
http://rhn.redhat.com/errata/RHSA-2016-1944.html
RHSA-2016:1944 - Security Advisory - Red Hat Customer Portal
-
http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html
Oracle Solaris Bulletin - October 2016Third Party Advisory
-
https://kb.isc.org/article/AA-01435
404 Page not found
-
http://www.securitytracker.com/id/1036903
BIND Bug in 'buffer.c' Constructing Query Responses Lets Remote Users Cause the Target Service to Crash - SecurityTracker
-
https://security.netapp.com/advisory/ntap-20160930-0001/
CVE-2016-2776 ISC BIND Vulnerability in Multiple NetApp Products | NetApp Product Security
-
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05321107
HPSBUX03664 SSRT110248 rev.1 HP-UX BIND Service running named, Remote Denial of Service (DoS)Third Party Advisory
-
https://www.exploit-db.com/exploits/40453/
ISC BIND 9 - Denial of Service
Products affected by CVE-2016-2776
- cpe:2.3:o:hp:hp-ux:11.31:*:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:*:p3:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.10.3:b1:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.10.3:*:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.10.1:rc2:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.10.1:rc1:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.10.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.10.0:p2:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.10.3:rc1:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.10.3:p3:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.10.2:p3:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.10.2:p2:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.10.1:b2:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.10.1:b1:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.10.0:b1:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.10.0:a2:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.10.2:rc2:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.10.2:rc1:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.10.2:p4:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.10.1:p2:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.10.1:p1:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.10.0:p1:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.10.0:b2:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.10.3:p2:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.10.3:p1:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.10.2:p1:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.10.2:b1:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.10.1:*:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.10.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.10.0:a1:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.10.0:*:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.11.0:a1:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.11.0:a2:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.10.4:p2:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.11.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.11.0:b3:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.11.0:b2:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.10.3:p4:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.11.0:a3:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.11.0:b1:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.10.4:p3:*:*:*:*:*:*
- cpe:2.3:o:oracle:solaris:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
- cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
- cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
- cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:oracle:vm_server:3.2:*:*:*:*:*:*:*
- cpe:2.3:o:oracle:vm_server:3.3:*:*:*:*:*:*:*
- cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:*:*