named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 does not properly handle DNAME records when parsing fetch reply messages, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed packet to the rndc (aka control channel) interface, related to alist.c and sexpr.c.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2016-03-09 15:59
Updated : 2017-11-20 18:29
NVD link : CVE-2016-1285
Mitre link : CVE-2016-1285
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
novell
- suse_manager
- suse_manager_proxy
- suse_openstack_cloud
isc
- bind