Think you have a false positive on this rule?

Sid 1-40344

Message

PROTOCOL-DNS ISC BIND isc_bufferadd assertion failure denial of service attempt

Summary

buffer.c in named in ISC BIND 9 before 9.9.9-P3, 9.10.x before 9.10.4-P3, and 9.11.x before 9.11.0rc3 does not properly construct responses, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted query.

Impact

CVSS base score 7.5 CVSS impact score 3.6 CVSS exploitability score 3.9 confidentialityImpact NONE integrityImpact NONE availabilityImpact NONE

CVE-2016-2776:

CVSS base score 7.5

CVSS impact score 3.6

CVSS exploitability score 3.9

Confidentiality Impact NONE

Integrity Impact NONE

Availability Impact HIGH

Detailed information

CVE-2016-2776: buffer.c in named in ISC BIND 9 before 9.9.9-P3, 9.10.x before 9.10.4-P3, and 9.11.x before 9.11.0rc3 does not properly construct responses, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted query.

Affected systems

  • isc bind 9.9.9
  • isc bind 9.10.0
  • isc bind 9.10.1
  • isc bind 9.10.2
  • isc bind 9.10.3
  • isc bind 9.10.4
  • isc bind 9.11.0
  • hp hp-ux 11.31
  • oracle linux 5.0
  • oracle linux 6.0
  • oracle linux 7.0
  • oracle solaris 10.0
  • oracle solaris 11.3
  • oracle vm_server 3.2
  • oracle vm_server 3.3
  • oracle vm_server 3.4

Ease of attack

CVE-2016-2776:

Access Vector

Access Complexity

Authentication

False positives

None known

False negatives

None known

Corrective action

Upgrade to the latest non-affected version of the software.

Apply the appropriate vendor supplied patches.

Contributors

  • Talos research team.
  • This document was generated from data supplied by the national vulnerability database, a product of the national institute of standards and technology.
  • For more information see nvd.

Additional References

  • kb.isc.org/article/AA-01419/74/CVE-2016-2776