CVE-2015-8704

CVSS V2 Medium 6.8 CVSS V3 Medium 6.5
Description
apl_42.c in ISC BIND 9.x before 9.9.8-P3, 9.9.x, and 9.10.x before 9.10.3-P3 allows remote authenticated users to cause a denial of service (INSIST assertion failure and daemon exit) via a malformed Address Prefix List (APL) record.
Overview
  • CVE ID
  • CVE-2015-8704
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Modified
  • Published Version
  • 2016-01-20T15:59:00
  • Last Modified Date
  • 2018-10-30T16:27:02
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:isc:bind:9.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.1.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.1.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.1.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.2.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.2.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.2.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.2.2:p3:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.2.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.2.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.2.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.2.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.2.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.3.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.3.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.3.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.3.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.4.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.4.0:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.4.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.4.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.4.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.4.3:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.5.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.5.0:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.5.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.5.1:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.5.1:rc2:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.5.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.5.2:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.5.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.5.3:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.6:r5_p1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.6:r6_b1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.6:r6_rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.6:r6_rc2:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.6:r7_p1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.6:r7_p2:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.9.8:p2:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.10.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.10.1:p1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.10.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.10.2:b1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.10.2:p1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.10.2:p2:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.10.2:p3:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.10.2:p4:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.10.2:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.10.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.10.3:p1:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.10.3:p2:*:*:*:*:*:* 1 OR
cpe:2.3:a:isc:bind:9.10.3:rc1:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:S/C:N/I:N/A:C
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • SINGLE
  • Confidentiality Impact
  • NONE
  • Integrity Impact
  • NONE
  • Availability Impact
  • COMPLETE
  • Base Score
  • 6.8
  • Severity
  • MEDIUM
  • Exploitability Score
  • 8
  • Impact Score
  • 6.9
CVSS Version 3
  • Version
  • 3.0
  • Vector String
  • CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • LOW
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • NONE
  • Availability Impact
  • HIGH
  • Base Score
  • 6.5
  • Base Severity
  • MEDIUM
  • Exploitability Score
  • 2.8
  • Impact Score
  • 3.6
References
Reference URL Reference Tags
https://kb.isc.org/article/AA-01335 Vendor Advisory
https://kb.isc.org/article/AA-01380 Vendor Advisory
http://marc.info/?l=bugtraq&m=145680832702035&w=2 Third Party Advisory
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html
http://www.securityfocus.com/bid/81329
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178045.html
http://rhn.redhat.com/errata/RHSA-2016-0073.html
http://rhn.redhat.com/errata/RHSA-2016-0074.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176564.html
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00020.html
http://www.securitytracker.com/id/1034739
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175973.html
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00025.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175977.html
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00023.html
http://www.debian.org/security/2016/dsa-3449
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00024.html
https://www.freebsd.org/security/advisories/FreeBSD-SA-16:08.bind.asc
http://www.ubuntu.com/usn/USN-2874-1
https://kb.isc.org/article/AA-01438
https://security.gentoo.org/glsa/201610-07
History
Created Old Value New Value Data Type Notes
2022-05-10 17:57:44 Added to TrackCVE
2022-12-02 07:59:17 2016-01-20T15:59Z 2016-01-20T15:59:00 CVE Published Date updated
2022-12-02 07:59:17 2018-10-30T16:27:02 CVE Modified Date updated
2022-12-02 07:59:17 Modified Vulnerability Status updated