Vulnerability Details : CVE-2016-9131
named in ISC BIND 9.x before 9.9.9-P5, 9.10.x before 9.10.4-P5, and 9.11.x before 9.11.0-P2 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed response to an RTYPE ANY query.
Vulnerability category: Input validationDenial of service
Products affected by CVE-2016-9131
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_workstation:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.11.0:a1:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.11.0:a2:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.10.4:p2:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.11.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.11.0:b3:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.11.0:b2:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.11.0:a3:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.11.0:b1:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.10.4:p3:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.9.9:-:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.9.9:b1:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.9.9:b2:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.9.9:p1:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.10.4:p4:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.11.0:p1:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.9.9:p4:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.9.9:p3:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.10.4:b2:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.10.4:b3:*:*:*:*:*:*
- cpe:2.3:a:isc:bind:9.10.4:rc1:*:*:*:*:*:*
- cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
- cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
- cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
- cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
Threat overview for CVE-2016-9131
Top countries where our scanners detected CVE-2016-9131
Top open port discovered on systems with this issue
53
IPs affected by CVE-2016-9131 305,373
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2016-9131!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2016-9131
65.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 98 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-9131
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2016-9131
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-9131
-
http://www.securitytracker.com/id/1037582
BIND Multiple Flaws Let Remote Users Cause the Target named Service to Stop Processing - SecurityTrackerThird Party Advisory;VDB Entry
-
http://www.debian.org/security/2017/dsa-3758
Debian -- Security Information -- DSA-3758-1 bind9Third Party Advisory
-
http://www.securityfocus.com/bid/95386
ISC BIND CVE-2016-9131 Remote Denial of Service VulnerabilityThird Party Advisory;VDB Entry
-
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05381687
HPESBUX03699 SSRT110304 rev.1 - HP-UX BIND, Multiple Remote Denial of Service (DoS)Patch;Third Party Advisory
-
https://kb.isc.org/article/AA-01439/74/CVE-2016-9131
CVE-2016-9131: A malformed response to an ANY query can cause an assertion failure during recursion - Security AdvisoriesPatch;Vendor Advisory
-
https://access.redhat.com/errata/RHSA-2017:1583
RHSA-2017:1583 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://security.gentoo.org/glsa/201708-01
BIND: Multiple vulnerabilities (GLSA 201708-01) — Gentoo securityThird Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2017-0062.html
RHSA-2017:0062 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://security.netapp.com/advisory/ntap-20180926-0005/
February 2018 ISC BIND Vulnerabilities in NetApp Products | NetApp Product SecurityThird Party Advisory
Jump to