2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2016-8864" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2016-11-02T17:59:00.187" ,
2025-04-12 12:06:01 +00:00
"lastModified" : "2025-04-12T10:46:40.837" ,
"vulnStatus" : "Deferred" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "named in ISC BIND 9.x before 9.9.9-P4, 9.10.x before 9.10.4-P4, and 9.11.x before 9.11.0-P1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a DNAME record in the answer section of a response to a recursive query, related to db.c and resolver.c."
} ,
{
"lang" : "es" ,
"value" : "named en ISC BIND 9.x en versiones anteriores a 9.9.9-P4, 9.10.x en versiones anteriores a 9.10.4-P4 y 9.11.x en versiones anteriores a 9.11.0-P1 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (fallo de aserci\u00f3n y salida de demonio) a trav\u00e9s de un registro DNAME en la secci\u00f3n de respuesta de una respuesta a una petici\u00f3n recursiva, relacionado con db.c y resolver.c."
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" ,
2024-11-23 07:09:57 +00:00
"baseScore" : 7.5 ,
"baseSeverity" : "HIGH" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
2024-11-23 07:09:57 +00:00
"availabilityImpact" : "HIGH"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 3.6
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:P" ,
2024-11-23 07:09:57 +00:00
"baseScore" : 5.0 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
2024-11-23 07:09:57 +00:00
"availabilityImpact" : "PARTIAL"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-617"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "9.0.0" ,
"versionEndExcluding" : "9.9.9" ,
"matchCriteriaId" : "DC6EDE55-A048-4189-92E3-CD86B72968FA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "9.10.0" ,
"versionEndExcluding" : "9.10.4" ,
"matchCriteriaId" : "D05ECE4F-94E0-49E6-BFBB-7DDC69D1AD54"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:isc:bind:9.9.9:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "2A2CF04B-BF26-43F9-8BF4-CEBB9BE3AE55"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:isc:bind:9.9.9:beta1:*:*:*:*:*:*" ,
"matchCriteriaId" : "81E0A500-84EA-47E2-9767-19D8D08CC344"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:isc:bind:9.9.9:beta2:*:*:*:*:*:*" ,
"matchCriteriaId" : "F1E53DC4-53B9-4127-9B8D-96DFFD1E340F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:isc:bind:9.9.9:p1:*:*:*:*:*:*" ,
"matchCriteriaId" : "376915CA-6BDB-423E-B216-64B098344DD9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:isc:bind:9.9.9:p2:*:*:*:*:*:*" ,
"matchCriteriaId" : "03215B90-9860-4CB4-B7D2-3DF045B129EB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:isc:bind:9.9.9:p3:*:*:*:*:*:*" ,
"matchCriteriaId" : "88335D70-E98B-469E-A2E7-1958EB5F10DA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:isc:bind:9.10.4:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "477AA5E9-2C6F-4CCC-B596-F3DF5AAB13C3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:isc:bind:9.10.4:beta1:*:*:*:*:*:*" ,
"matchCriteriaId" : "CCF5FAB8-202C-4892-90C9-237292E840D6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:isc:bind:9.10.4:beta2:*:*:*:*:*:*" ,
"matchCriteriaId" : "4B059C6D-9CB3-48A8-8E9C-AD83000A422A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:isc:bind:9.10.4:beta3:*:*:*:*:*:*" ,
"matchCriteriaId" : "1F463911-2412-433F-87E9-AE9F22846A7C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:isc:bind:9.10.4:p1:*:*:*:*:*:*" ,
"matchCriteriaId" : "BB2D2132-62E8-4E73-A0BF-4790DAFC5558"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:isc:bind:9.10.4:p2:*:*:*:*:*:*" ,
"matchCriteriaId" : "E253BD9F-25B8-42E7-BEAB-E843381ED155"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:isc:bind:9.10.4:p3:*:*:*:*:*:*" ,
"matchCriteriaId" : "6B5E42E5-27C6-4D6F-B7DC-903B10BF2017"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:isc:bind:9.11.0:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "83538F7C-B8A7-4B8F-B0CB-E92400FF2456"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:isc:bind:9.11.0:alpha1:*:*:*:*:*:*" ,
"matchCriteriaId" : "1A6E457F-750E-445E-8655-72B0D0342F6F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:isc:bind:9.11.0:alpha2:*:*:*:*:*:*" ,
"matchCriteriaId" : "5C2775BB-32E1-4407-8094-1F7FD86943F2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:isc:bind:9.11.0:alpha3:*:*:*:*:*:*" ,
"matchCriteriaId" : "5A22E38E-0D40-40BA-8FFE-A499F12D041E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:isc:bind:9.11.0:beta1:*:*:*:*:*:*" ,
"matchCriteriaId" : "F88EAF34-A2F3-4189-AD37-510A9E997F78"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:isc:bind:9.11.0:beta2:*:*:*:*:*:*" ,
"matchCriteriaId" : "BF5BEF3F-28E2-446C-A6E2-A44FC83EA34E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:isc:bind:9.11.0:beta3:*:*:*:*:*:*" ,
"matchCriteriaId" : "CEDBF802-1C10-4C22-966A-4BDED67BFF75"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E0C4B1E5-75BF-43AE-BBAC-0DD4124C71ED"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E94F7F59-1785-493F-91A7-5F5EA5E87E4D"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "133AAFA7-AF42-4D7B-8822-AA2E85611BF5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "33C068A4-3780-4EAB-A937-6082DF847564"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "967EC28A-607F-48F4-AD64-5E3041C768F0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AE1D81A1-CD24-4B17-8AFD-DC95E90AD7D0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "807C024A-F8E8-4B48-A349-4C68CD252CA1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F96E3779-F56A-45FF-BB3D-4980527D721E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0CF73560-2F5B-4723-A8A1-9AADBB3ADA00"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5BF3C7A5-9117-42C7-BEA1-4AA378A582EF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "83737173-E12E-4641-BC49-0BD84A6B29D0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "54D669D4-6D7E-449D-80C1-28FA44F06FFE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9BBCD86A-E6C7-4444-9D74-F861084090F0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "51EF4996-72F4-4FA4-814F-F5991E7A8318"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AD6D0378-F0F4-4AAA-80AF-8287C790EC96"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AF83BB87-B203-48F9-9D06-48A5FE399050"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1F3BEFDB-5156-4E1C-80BB-8BE9FEAA7623"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "16E6D998-B41D-4B49-9E00-8336D2E40A4A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1C8D871B-AEA1-4407-AEE3-47EC782250FF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "98381E61-F082-4302-B51F-5648884F998B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D99A687E-EAE6-417E-A88E-D0082BC194CD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B353CE99-D57C-465B-AAB0-73EF581127D1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7431ABC1-9252-419E-8CC1-311B41360078"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "835AE071-CEAE-49E5-8F0C-E5F50FB85EFC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "13E02156-E748-4820-B76F-7074793837E1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6755B6AD-0422-467B-8115-34A60B1D1A40"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B76AA310-FEC7-497F-AF04-C3EC1E76C4CC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "17F256A9-D3B9-4C72-B013-4EFD878BFEA8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D0AC5CD5-6E58-433C-9EB3-6DFE5656463E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E5ED5807-55B7-47C5-97A6-03233F4FBC3A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "825ECE2D-E232-46E0-A047-074B34DB1E97"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2141.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2142.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2615.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2871.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://www.debian.org/security/2016/dsa-3703" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://www.securityfocus.com/bid/94067" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory" ,
"VDB Entry"
]
} ,
{
"url" : "http://www.securitytracker.com/id/1037156" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory" ,
"VDB Entry"
]
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2017:1583" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05381687" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://kb.isc.org/article/AA-01434" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "https://kb.isc.org/article/AA-01435" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "https://kb.isc.org/article/AA-01436" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "https://kb.isc.org/article/AA-01437" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "https://kb.isc.org/article/AA-01438" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:34.bind.asc" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://security.gentoo.org/glsa/201701-26" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://security.netapp.com/advisory/ntap-20180926-0005/" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
2024-11-23 07:09:57 +00:00
} ,
{
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2141.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2142.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2615.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2871.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://www.debian.org/security/2016/dsa-3703" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://www.securityfocus.com/bid/94067" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory" ,
"VDB Entry"
]
} ,
{
"url" : "http://www.securitytracker.com/id/1037156" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory" ,
"VDB Entry"
]
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2017:1583" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05381687" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://kb.isc.org/article/AA-01434" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "https://kb.isc.org/article/AA-01435" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "https://kb.isc.org/article/AA-01436" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "https://kb.isc.org/article/AA-01437" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "https://kb.isc.org/article/AA-01438" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:34.bind.asc" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://security.gentoo.org/glsa/201701-26" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://security.netapp.com/advisory/ntap-20180926-0005/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}