7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.8 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
0.973 High
EPSS
Percentile
99.8%
Debian Security Advisory DSA-3680-1 [email protected]
https://www.debian.org/security/ Florian Weimer
September 27, 2016 https://www.debian.org/security/faq
Package : bind9
CVE ID : CVE-2016-2775 CVE-2016-2776
Debian Bug : 831796 839010
Two vulnerabilities were reported in BIND, a DNS server.
CVE-2016-2775
The lwresd component in BIND (which is not enabled by default)
could crash while processing an overlong request name. This could
lead to a denial of service.
CVE-2016-2776
A crafted query could crash the BIND name server daemon, leading
to a denial of service. All server roles (authoritative,
recursive and forwarding) in default configurations are are
affected.
For the stable distribution (jessie), these problems have been fixed in
version 1:9.9.5.dfsg-9+deb8u7.
We recommend that you upgrade your bind9 packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 8 | armhf | bind9-host | < 1:9.9.5.dfsg-9+deb8u7 | bind9-host_1:9.9.5.dfsg-9+deb8u7_armhf.deb |
Debian | 8 | mips | dnsutils | < 1:9.9.5.dfsg-9+deb8u7 | dnsutils_1:9.9.5.dfsg-9+deb8u7_mips.deb |
Debian | 8 | mips | libirs-export91 | < 1:9.9.5.dfsg-9+deb8u7 | libirs-export91_1:9.9.5.dfsg-9+deb8u7_mips.deb |
Debian | 8 | i386 | libisccfg90 | < 1:9.9.5.dfsg-9+deb8u7 | libisccfg90_1:9.9.5.dfsg-9+deb8u7_i386.deb |
Debian | 7 | amd64 | libisc84 | < 1:9.8.4.dfsg.P1-6+nmu2+deb7u11 | libisc84_1:9.8.4.dfsg.P1-6+nmu2+deb7u11_amd64.deb |
Debian | 8 | kfreebsd-i386 | bind9 | < 1:9.9.5.dfsg-9+deb8u7 | bind9_1:9.9.5.dfsg-9+deb8u7_kfreebsd-i386.deb |
Debian | 8 | powerpc | libbind9-90 | < 1:9.9.5.dfsg-9+deb8u7 | libbind9-90_1:9.9.5.dfsg-9+deb8u7_powerpc.deb |
Debian | 7 | amd64 | libdns88 | < 1:9.8.4.dfsg.P1-6+nmu2+deb7u11 | libdns88_1:9.8.4.dfsg.P1-6+nmu2+deb7u11_amd64.deb |
Debian | 8 | all | bind9-doc | < 1:9.9.5.dfsg-9+deb8u7 | bind9-doc_1:9.9.5.dfsg-9+deb8u7_all.deb |
Debian | 8 | s390x | libdns-export100-udeb | < 1:9.9.5.dfsg-9+deb8u7 | libdns-export100-udeb_1:9.9.5.dfsg-9+deb8u7_s390x.deb |
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.8 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
0.973 High
EPSS
Percentile
99.8%