mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
272 lines
9.4 KiB
JSON
272 lines
9.4 KiB
JSON
{
|
|
"id": "CVE-2016-2088",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2016-03-09T23:59:04.493",
|
|
"lastModified": "2017-07-01T01:29:37.467",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "resolver.c in named in ISC BIND 9.10.x before 9.10.3-P4, when DNS cookies are enabled, allows remote attackers to cause a denial of service (INSIST assertion failure and daemon exit) via a malformed packet with more than one cookie option."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "resolver.c en named en ISC BIND 9.10.x en versiones anteriores a 9.10.3-P4, cuando las cookies DNS est\u00e1n habilitadas, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (fallo de aserci\u00f3n INSIST y salida de demonio) a trav\u00e9s de un paquete mal formado con m\u00e1s de una opci\u00f3n de cookie."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV30": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.0",
|
|
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "HIGH",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 6.8,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 2.2,
|
|
"impactScore": 4.0
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 4.3
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-20"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.10.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "92ECA27E-4248-49BD-A84C-4854CCA19AC5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.10.0:a1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8B0C031F-96F1-4117-83B7-82EE749FC6BB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.10.0:a2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F5D7D5B7-5696-4B51-954E-F32DF9617D9E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.10.0:b1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2B953804-C53B-4C77-AAE4-C60961C23A39"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.10.0:b2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "51BBFF21-4E77-44EC-B472-6925904772AC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.10.0:p1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8FAA10DC-71AC-4E56-900A-B69B24917DE7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.10.0:p2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9A0C5E26-B896-449D-B004-337C9C0C40F5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.10.0:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "444326E3-9D0D-4C9F-9B86-2AB6ADE1F405"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.10.0:rc2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "812CD568-82C1-4F44-99BA-1F1DF3AF16EF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.10.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "16EB6777-8E49-4B07-B859-06D0C2F29DC8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.10.1:b1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A2574190-E1DC-46B9-AE82-5581960D8819"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.10.1:b2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5EB06ECC-D36F-4BE7-93BF-8B1C025298EA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.10.1:p1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "54E5A7DC-D432-470A-B95A-AF8EE1ECB561"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.10.1:p2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A6F3181D-BB94-4700-A66C-8503B7B4107C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.10.1:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8EB2A5D6-DEDF-4962-8117-2F1FADB5B984"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.10.1:rc2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "26B6584A-707A-463C-BB2F-1D663FE50C01"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.10.2:b1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D35C161A-3CCC-4FFC-9698-98FAE71BBF2F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.10.2:p1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6518FD7D-0249-4793-9531-E5338EEC4C7B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.10.2:p2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D468B433-D785-4A5B-A8CC-B2F1B27BAB7C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.10.2:p3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7BCF9BD9-F557-408C-9CD7-BD0EAD66366F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.10.2:p4:*:*:*:*:*:*",
|
|
"matchCriteriaId": "407F36C2-886C-48A7-A3AB-E5F9194775D0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.10.2:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "24CEA3F3-C4F8-4BD1-92EA-AC1B54A3CFE6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.10.2:rc2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "574C2F69-C5A0-48C6-8F13-C164518B8ED8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.10.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "40BD4A8C-785C-4460-AB52-B249C5DC9BC3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.10.3:b1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6AAE7145-F1BA-4BEA-841E-DEE08891A3D5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.10.3:p1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "88359A5D-CE32-4920-BE5D-98EC262B41EB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.10.3:p2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B77760E4-57C5-4A5E-A169-C84409930757"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.10.3:p3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "24E9CBCA-241C-4EF6-8C0C-FA32E81B8B7C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:isc:bind:9.10.3:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "893ACAAC-406E-4A1C-970B-A15B42961271"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181036.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178831.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179904.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/84290",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id/1035238",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://kb.isc.org/article/AA-01351",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://kb.isc.org/article/AA-01380",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://security.gentoo.org/glsa/201610-07",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |