{"id":"CVE-2016-2088","details":"resolver.c in named in ISC BIND 9.10.x before 9.10.3-P4, when DNS cookies are enabled, allows remote attackers to cause a denial of service (INSIST assertion failure and daemon exit) via a malformed packet with more than one cookie option.","modified":"2026-04-01T23:48:47.791435Z","published":"2016-03-09T23:59:04.493Z","related":["MGASA-2016-0107","openSUSE-SU-2024:10467-1"],"references":[{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181036.html"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178831.html"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179904.html"},{"type":"WEB","url":"http://www.securityfocus.com/bid/84290"},{"type":"WEB","url":"http://www.securitytracker.com/id/1035238"},{"type":"WEB","url":"https://kb.isc.org/article/AA-01380"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201610-07"},{"type":"ADVISORY","url":"https://kb.isc.org/article/AA-01351"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://gitlab.isc.org/isc-projects/bind9","events":[{"introduced":"0"},{"last_affected":"63fbb3ea39094353765c04a6066b9e1d1013992a"},{"introduced":"0"},{"last_affected":"ed70f92dd054be3f0bb3939ea7f0749afaaca94a"},{"introduced":"0"},{"last_affected":"8058292627cf5827941471ebda7ab9765a5a3ded"},{"introduced":"0"},{"last_affected":"ed70f92dd054be3f0bb3939ea7f0749afaaca94a"},{"introduced":"0"},{"last_affected":"8058292627cf5827941471ebda7ab9765a5a3ded"},{"introduced":"0"},{"last_affected":"ed70f92dd054be3f0bb3939ea7f0749afaaca94a"},{"introduced":"0"},{"last_affected":"8058292627cf5827941471ebda7ab9765a5a3ded"},{"introduced":"0"},{"last_affected":"f5df4974b7b5081c4778d5796127b4d6584e834e"},{"introduced":"0"},{"last_affected":"a326778a0a471e3c36a9ed400ffba42a79c9a451"},{"introduced":"0"},{"last_affected":"fe66c6b1529a744c3f863119d5ddedb436275c2f"},{"introduced":"0"},{"last_affected":"cc152ad50f8255cd7b830026123d86040a1167e2"},{"introduced":"0"},{"last_affected":"bf3ebcb44cf23cfd73ce9947d03a075e86c09c56"},{"introduced":"0"},{"last_affected":"cc152ad50f8255cd7b830026123d86040a1167e2"},{"introduced":"0"},{"last_affected":"bf3ebcb44cf23cfd73ce9947d03a075e86c09c56"},{"introduced":"0"},{"last_affected":"9c1a043383b6cd804d0b4f56aacce345248ec024"},{"introduced":"0"},{"last_affected":"90f5dc6f4505141f9e94d3bc704da0dd24612219"},{"introduced":"0"},{"last_affected":"fb3b6818adaa628147ea308b62070c97483caf65"},{"introduced":"0"},{"last_affected":"fb3b6818adaa628147ea308b62070c97483caf65"},{"introduced":"0"},{"last_affected":"638a11d49e0a9763c1eda26795cab37de40c2788"},{"introduced":"0"},{"last_affected":"e5e8feeccdf11b17b478d43e9203fb7896edf347"},{"introduced":"0"},{"last_affected":"2754d37321d2b3c3506c2d70cbb276a6b1ed991b"},{"introduced":"0"},{"last_affected":"d0c7c4694d6bbf3ad452e6506897d13f0b25f7fa"},{"introduced":"0"},{"last_affected":"551bea57432caa68828c5c80722f790e6a658f7c"},{"introduced":"0"},{"last_affected":"2799933bc6790356d4b3eebdfe21dc0f87977f14"},{"introduced":"0"},{"last_affected":"b3e2361dba162951931821a1a01b02078c491603"},{"introduced":"0"},{"last_affected":"b3e2361dba162951931821a1a01b02078c491603"},{"introduced":"0"},{"last_affected":"f9be8b2189e49a354210237e55054b9399f03c96"},{"introduced":"0"},{"last_affected":"bdaecad72d6e5e49998139da55c48e0125806758"},{"introduced":"0"},{"last_affected":"29904d05643601b44cd88110197411afb0a03230"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"9.10.0"},{"introduced":"0"},{"last_affected":"9.10.0-a1"},{"introduced":"0"},{"last_affected":"9.10.0-a2"},{"introduced":"0"},{"last_affected":"9.10.0-b1"},{"introduced":"0"},{"last_affected":"9.10.0-b2"},{"introduced":"0"},{"last_affected":"9.10.0-p1"},{"introduced":"0"},{"last_affected":"9.10.0-p2"},{"introduced":"0"},{"last_affected":"9.10.0-rc1"},{"introduced":"0"},{"last_affected":"9.10.0-rc2"},{"introduced":"0"},{"last_affected":"9.10.1"},{"introduced":"0"},{"last_affected":"9.10.1-b1"},{"introduced":"0"},{"last_affected":"9.10.1-b2"},{"introduced":"0"},{"last_affected":"9.10.1-p1"},{"introduced":"0"},{"last_affected":"9.10.1-p2"},{"introduced":"0"},{"last_affected":"9.10.1-rc1"},{"introduced":"0"},{"last_affected":"9.10.1-rc2"},{"introduced":"0"},{"last_affected":"9.10.2-b1"},{"introduced":"0"},{"last_affected":"9.10.2-p1"},{"introduced":"0"},{"last_affected":"9.10.2-p2"},{"introduced":"0"},{"last_affected":"9.10.2-p3"},{"introduced":"0"},{"last_affected":"9.10.2-p4"},{"introduced":"0"},{"last_affected":"9.10.2-rc1"},{"introduced":"0"},{"last_affected":"9.10.2-rc2"},{"introduced":"0"},{"last_affected":"9.10.3"},{"introduced":"0"},{"last_affected":"9.10.3-b1"},{"introduced":"0"},{"last_affected":"9.10.3-p1"},{"introduced":"0"},{"last_affected":"9.10.3-p2"},{"introduced":"0"},{"last_affected":"9.10.3-p3"},{"introduced":"0"},{"last_affected":"9.10.3-rc1"}]}}],"versions":["v9.0.0","v9.0.0a1","v9.0.0a2","v9.0.0a3","v9.0.0b1","v9.0.0b2","v9.0.0b3","v9.0.0b4","v9.0.0b5","v9.0.0rc1","v9.0.0rc2","v9.0.0rc3","v9.0.0rc4","v9.0.0rc5","v9.0.0rc6","v9.0.1","v9.0.1rc1","v9.0.1rc2","v9.1.0","v9.1.0b1","v9.1.0b2","v9.1.0b3","v9.1.0rc1","v9.1.1","v9.1.1-P1","v9.1.1-P2","v9.1.1-P3","v9.1.1-P4","v9.1.1rc1","v9.1.1rc2","v9.1.1rc3","v9.1.1rc4","v9.1.1rc5","v9.1.1rc6","v9.1.1rc7","v9.1.2","v9.1.2rc1","v9.1.3","v9.1.3-P1","v9.1.3-P2","v9.1.3-P3","v9.1.3rc1","v9.1.3rc2","v9.1.3rc3","v9.10.0a1","v9.10.0a2","v9.10.0b1","v9.2.0","v9.2.0-P1","v9.2.0-P2","v9.2.0a1","v9.2.0a2","v9.2.0a3","v9.2.0b1","v9.2.0b2","v9.2.0rc1","v9.2.0rc10","v9.2.0rc2","v9.2.0rc3","v9.2.0rc4","v9.2.0rc5","v9.2.0rc6","v9.2.0rc7","v9.2.0rc8","v9.2.0rc9","v9.2.1","v9.2.1-P1","v9.2.1rc1","v9.2.1rc2","v9.2.2","v9.2.2-P1","v9.2.2-P2","v9.2.2-P3","v9.2.2rc1","v9.2.3","v9.2.3rc1","v9.2.3rc2","v9.2.3rc3","v9.2.3rc4","v9.2.4","v9.2.4rc1","v9.2.4rc2","v9.2.4rc3","v9.2.4rc4","v9.2.4rc5","v9.2.4rc6","v9.2.4rc7","v9.2.4rc8","v9.2.5","v9.2.5rc1","v9.2.6","v9.2.6-P1","v9.2.6-P2","v9.2.6b1","v9.2.6b2","v9.2.6rc1","v9.2.7","v9.2.7b1","v9.2.7rc1","v9.2.7rc2","v9.2.7rc3","v9.2.8","v9.2.8-P1","v9.2.9","v9.2.9b1","v9.2.9rc1","v9.3.0","v9.3.0rc1","v9.3.0rc2","v9.3.0rc3","v9.3.0rc4","v9.3.1","v9.3.1rc1","v9.3.2","v9.3.2-P1","v9.3.2-P2","v9.3.2b1","v9.3.2b2","v9.3.2rc1","v9.3.3","v9.3.3b1","v9.3.3rc1","v9.3.3rc2","v9.3.3rc3","v9.3.4","v9.3.4-P1","v9.3.5","v9.3.5-P1","v9.3.5-P2","v9.3.5-P2-W1","v9.3.5-P2-W2","v9.3.5b1","v9.3.5rc1","v9.3.5rc2","v9.3.6","v9.3.6-P1","v9.3.6-P2","v9.3.6b1","v9.3.6rc1","v9.4-ESV","v9.4-ESV-R1","v9.4-ESV-R2","v9.4-ESV-R3","v9.4-ESV-R4","v9.4-ESV-R4-P1","v9.4-ESV-R5","v9.4-ESV-R5-P1","v9.4-ESV-R5b1","v9.4-ESV-R5rc1","v9.4-ESVb1","v9.4-ESVrc1","v9.4.0","v9.4.0a1","v9.4.0a2","v9.4.0a3","v9.4.0a4","v9.4.0a5","v9.4.0a6","v9.4.0b1","v9.4.0b2","v9.4.0b3","v9.4.0b4","v9.4.0rc1","v9.4.0rc2","v9.4.1","v9.4.1-P1","v9.4.2","v9.4.2-P1","v9.4.2-P2","v9.4.2-P2-W1","v9.4.2-P2-W2","v9.4.2b1","v9.4.2rc1","v9.4.2rc2","v9.4.3","v9.4.3-P1","v9.4.3-P2","v9.4.3-P3","v9.4.3-P4","v9.4.3-P5","v9.4.3b1","v9.4.3b2","v9.4.3b3","v9.4.3rc1","v9.4.4b1","v9.5.0","v9.5.0-P1","v9.5.0-P2","v9.5.0-P2-W1","v9.5.0-P2-W2","v9.5.0a1","v9.5.0a2","v9.5.0a3","v9.5.0a4","v9.5.0a5","v9.5.0a6","v9.5.0a7","v9.5.0b1","v9.5.0b2","v9.5.0b3","v9.5.0rc1","v9.5.1","v9.5.1-P1","v9.5.1-P2","v9.5.1-P3","v9.5.1b1","v9.5.1b2","v9.5.1b3","v9.5.1rc1","v9.5.1rc2","v9.5.2","v9.5.2-P1","v9.5.2-P2","v9.5.2-P3","v9.5.2-P4","v9.5.2b1","v9.5.2rc1","v9.5.3b1","v9.5.3rc1","v9.6-ESV","v9.6-ESV-R1","v9.6-ESV-R10","v9.6-ESV-R10-P1","v9.6-ESV-R10b1","v9.6-ESV-R10rc1","v9.6-ESV-R10rc2","v9.6-ESV-R11","v9.6-ESV-R11b1","v9.6-ESV-R11rc1","v9.6-ESV-R11rc2","v9.6-ESV-R2","v9.6-ESV-R3","v9.6-ESV-R4","v9.6-ESV-R4-P1","v9.6-ESV-R4-P2","v9.6-ESV-R4-P3","v9.6-ESV-R5","v9.6-ESV-R5-P1","v9.6-ESV-R5b1","v9.6-ESV-R5rc1","v9.6-ESV-R6","v9.6-ESV-R6b1","v9.6-ESV-R6rc1","v9.6-ESV-R6rc2","v9.6-ESV-R7","v9.6-ESV-R7-P1","v9.6-ESV-R7-P2","v9.6-ESV-R7-P3","v9.6-ESV-R7-P4","v9.6-ESV-R8","v9.6-ESV-R8b1","v9.6-ESV-R9","v9.6-ESV-R9-P1","v9.6-ESV-R9b1","v9.6-ESV-R9b2","v9.6-ESV-R9rc1","v9.6-ESV-R9rc2","v9.6.0","v9.6.0-P1","v9.6.0a1","v9.6.0b1","v9.6.0rc1","v9.6.0rc2","v9.6.1","v9.6.1-P1","v9.6.1-P2","v9.6.1-P3","v9.6.1b1","v9.6.1rc1","v9.6.2","v9.6.2-P1","v9.6.2-P2","v9.6.2-P3","v9.6.2b1","v9.6.2rc1","v9.6.3","v9.6.3b1","v9.6.3rc1","v9.7.0","v9.7.0-P1","v9.7.0-P2","v9.7.0a1","v9.7.0a2","v9.7.0a3","v9.7.0b1","v9.7.0b2","v9.7.0b3","v9.7.0rc1","v9.7.0rc2","v9.7.1","v9.7.1-P1","v9.7.1-P2","v9.7.1b1","v9.7.1rc1","v9.7.2","v9.7.2-P1","v9.7.2-P2","v9.7.2-P3","v9.7.2b1","v9.7.2rc1","v9.7.3","v9.7.3-P1","v9.7.3-P2","v9.7.3-P3","v9.7.3b1","v9.7.3rc1","v9.7.4","v9.7.4-P1","v9.7.4b1","v9.7.4rc1","v9.7.5","v9.7.5-W1","v9.7.5b1","v9.7.5rc1","v9.7.5rc2","v9.7.6","v9.7.6-P1","v9.7.6-P2","v9.7.6-P3","v9.7.6-P4","v9.7.7","v9.7.7b1","v9.7.7rc1","v9.8.0","v9.8.0-P1","v9.8.0-P2","v9.8.0-P3","v9.8.0-P4","v9.8.0a1","v9.8.0b1","v9.8.0rc1","v9.8.1","v9.8.1-P1","v9.8.1b1","v9.8.1b2","v9.8.1b3","v9.8.1rc1","v9.8.2","v9.8.2-W1","v9.8.2b1","v9.8.2rc1","v9.8.2rc2","v9.8.3","v9.8.3-P1","v9.8.3-P2","v9.8.3-P3","v9.8.3-P4","v9.8.4","v9.8.4-P1","v9.8.4-P2","v9.8.4b1","v9.8.4rc1","v9.8.5","v9.8.5-P1","v9.8.5-P2","v9.8.5b1","v9.8.5b2","v9.8.5rc1","v9.8.5rc2","v9.8.6","v9.8.6-P1","v9.8.6-P2","v9.8.6b1","v9.8.6rc1","v9.8.6rc2","v9.8.7","v9.8.7-P1","v9.8.7-W1","v9.8.7b1","v9.8.7rc1","v9.8.7rc2","v9.8.8","v9.8.8b1","v9.8.8b2","v9.8.8rc1","v9.8.8rc2","v9.8.9-P2","v9.9-ESV-R10-P2","v9.9.0","v9.9.0-W1","v9.9.0a1","v9.9.0a2","v9.9.0a3","v9.9.0b1","v9.9.0b2","v9.9.0rc1","v9.9.0rc2","v9.9.0rc3","v9.9.0rc4","v9.9.1","v9.9.1-P1","v9.9.1-P2","v9.9.1-P3","v9.9.1-P4","v9.9.10","v9.9.10-P1","v9.9.10-P2","v9.9.10-P3","v9.9.10b1","v9.9.10rc1","v9.9.10rc2","v9.9.10rc3","v9.9.11","v9.9.11-P1","v9.9.11b1","v9.9.11rc1","v9.9.11rc2","v9.9.12","v9.9.12b1","v9.9.12rc1","v9.9.13","v9.9.13rc1","v9.9.13rc2","v9.9.2","v9.9.2-P1","v9.9.2-P2","v9.9.2b1","v9.9.2rc1","v9.9.3","v9.9.3-P1","v9.9.3-P2","v9.9.3b1","v9.9.3b2","v9.9.3rc1","v9.9.3rc2","v9.9.4","v9.9.4-P1","v9.9.4-P2","v9.9.4b1","v9.9.4rc1","v9.9.4rc2","v9.9.5","v9.9.5-P1","v9.9.5-W1","v9.9.5b1","v9.9.5rc1","v9.9.5rc2","v9.9.6","v9.9.6-P1","v9.9.6-P2","v9.9.6b1","v9.9.6b2","v9.9.6rc1","v9.9.6rc2","v9.9.7","v9.9.7-P1","v9.9.7-P2","v9.9.7-P3","v9.9.7b1","v9.9.7rc1","v9.9.7rc2","v9.9.8","v9.9.8-P2","v9.9.8-P3","v9.9.8-P4","v9.9.8b1","v9.9.8rc1","v9.9.9","v9.9.9-P1","v9.9.9-P2","v9.9.9-P3","v9.9.9-P4","v9.9.9-P5","v9.9.9-P6","v9.9.9-P8","v9.9.9b1","v9.9.9b2","v9.9.9rc1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-2088.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H"}]}