{"id":"CVE-2016-9131","details":"named in ISC BIND 9.x before 9.9.9-P5, 9.10.x before 9.10.4-P5, and 9.11.x before 9.11.0-P2 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed response to an RTYPE ANY query.","modified":"2026-04-10T03:54:05.372270Z","published":"2017-01-12T06:59:00.250Z","related":["CGA-vr7h-f33q-jgjr","MGASA-2017-0478","SUSE-SU-2017:0111-1","SUSE-SU-2017:0112-1","SUSE-SU-2017:0113-1","openSUSE-SU-2024:10650-1"],"references":[{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0062.html"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1037582"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201708-01"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20180926-0005/"},{"type":"ADVISORY","url":"http://www.debian.org/security/2017/dsa-3758"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/95386"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1583"},{"type":"FIX","url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05381687"},{"type":"FIX","url":"https://kb.isc.org/article/AA-01439/74/CVE-2016-9131"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/isc-projects/bind9","events":[{"introduced":"0"},{"last_affected":"f8a0c0bed6ed629e314d22619510939c61d88b0e"},{"introduced":"0"},{"last_affected":"d7e5f7903de06e504aac4a3822a41d69e159e370"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"8.0"},{"introduced":"0"},{"last_affected":"7.5"}]}},{"type":"GIT","repo":"https://gitlab.isc.org/isc-projects/bind9","events":[{"introduced":"19d6c56085e97cf4ac559cdc27edd624127bcb32"},{"last_affected":"2d6d4babba5b5d2237bd37c0e4c3c993b7efd255"},{"introduced":"63fbb3ea39094353765c04a6066b9e1d1013992a"},{"last_affected":"2799933bc6790356d4b3eebdfe21dc0f87977f14"},{"introduced":"0"},{"last_affected":"b7843f9794be456c53d7dc0b51ead89f2c5d3351"},{"introduced":"0"},{"last_affected":"9833cd85a811d3a4313948f324d3906937633e65"},{"introduced":"0"},{"last_affected":"d6d860e96ed5b20c1a77d5d19a29194174a1e5a0"},{"introduced":"0"},{"last_affected":"9833cd85a811d3a4313948f324d3906937633e65"},{"introduced":"0"},{"last_affected":"1b68143f200f6b88cc7d395f600e63b5c28362c8"},{"introduced":"0"},{"last_affected":"53185941dd83e11acf5ea5ebca9748987159803a"},{"introduced":"0"},{"last_affected":"d36f894b881427035c9163b939cb64c75e6fdd7a"},{"introduced":"0"},{"last_affected":"2f98c1c2a0b92c83cd9a9e6d53363537f4819c40"},{"introduced":"0"},{"last_affected":"d36f894b881427035c9163b939cb64c75e6fdd7a"},{"introduced":"0"},{"last_affected":"2f98c1c2a0b92c83cd9a9e6d53363537f4819c40"},{"introduced":"0"},{"last_affected":"853aa4b2e04de28173429fc24780b21fadb5cef5"},{"introduced":"0"},{"last_affected":"cea32f84f0d063ca525336f54f3bb1127ee0f5fa"},{"introduced":"0"},{"last_affected":"dca6957b62013f523e54084c92152f571d08f6c0"},{"introduced":"0"},{"last_affected":"111ec860a840d09dbd0551044e5fdc37d546c6b6"},{"introduced":"0"},{"last_affected":"a23f742c3d767f41bfb1a143b0605a766936c4d9"},{"introduced":"0"},{"last_affected":"dca6957b62013f523e54084c92152f571d08f6c0"},{"introduced":"0"},{"last_affected":"111ec860a840d09dbd0551044e5fdc37d546c6b6"},{"introduced":"0"},{"last_affected":"a23f742c3d767f41bfb1a143b0605a766936c4d9"},{"introduced":"0"},{"last_affected":"dca6957b62013f523e54084c92152f571d08f6c0"},{"introduced":"0"},{"last_affected":"e0815f81205101e6fce3aa87dead307ea9624df3"}],"database_specific":{"versions":[{"introduced":"9.0"},{"last_affected":"9.9.8"},{"introduced":"9.10.0"},{"last_affected":"9.10.3"},{"introduced":"0"},{"last_affected":"9.9.9-NA"},{"introduced":"0"},{"last_affected":"9.9.9-b1"},{"introduced":"0"},{"last_affected":"9.9.9-b2"},{"introduced":"0"},{"last_affected":"9.9.9-p1"},{"introduced":"0"},{"last_affected":"9.9.9-p3"},{"introduced":"0"},{"last_affected":"9.9.9-p4"},{"introduced":"0"},{"last_affected":"9.10.4-b2"},{"introduced":"0"},{"last_affected":"9.10.4-b3"},{"introduced":"0"},{"last_affected":"9.10.4-p2"},{"introduced":"0"},{"last_affected":"9.10.4-p3"},{"introduced":"0"},{"last_affected":"9.10.4-p4"},{"introduced":"0"},{"last_affected":"9.10.4-rc1"},{"introduced":"0"},{"last_affected":"9.11.0-a1"},{"introduced":"0"},{"last_affected":"9.11.0-a2"},{"introduced":"0"},{"last_affected":"9.11.0-a3"},{"introduced":"0"},{"last_affected":"9.11.0-b1"},{"introduced":"0"},{"last_affected":"9.11.0-b2"},{"introduced":"0"},{"last_affected":"9.11.0-b3"},{"introduced":"0"},{"last_affected":"9.11.0-p1"},{"introduced":"0"},{"last_affected":"9.11.0-rc1"}]}}],"versions":["ondrej/008bfb6249a5f81d9e02ad4d39fda63fab57a0ad","ondrej/00ce93a69cd809810b82dbb229abf59d8e5850cc","ondrej/067f87f158b633e18a9c6fd0b038d1dc288bcb74","ondrej/074c7cc12c0eda40441926a8a96631c3176824a9","ondrej/1a1413ff5910ace7919bb8db0a1bb1f6e9c9ff7d","ondrej/2438db2eae8baf084615aff3b210ea51cd2f1fe1","ondrej/4098157e6ce98910ff99c58c41c6cf8069b79cc7","ondrej/4281aaab4503116fcf50caa348e1b5e7d414b742","ondrej/42e84e4b97be23f2b3754844e9d4478f48e92b48","ondrej/46caf5f4a4522d42480aee4d5949ea9546f98c2f","ondrej/4d292fc37ff5e99462756352c6028af7d0becf74","ondrej/4f369af51ede0e5ac7b3a14c451c5a41350a61cc","ondrej/53738634c3b511bd78e6626df95ae140631b080c","ondrej/6d06e7e7e585e30b419e4e20815cb8233c48f7b1","ondrej/6d1fdb850516a8d1fbfa853c56a1ef7627d54a72","ondrej/761b47a64845cb647d4fa3362be538eb0e7174d9","ondrej/840e56a979c3719ded668d5aaa04b1bddce465ef","ondrej/9cd2880a82f627bc44ab65fdaa19c2bcd9e61c96","ondrej/a42afbce2e34a5f990517fee7eab013c4adb8c0a","ondrej/a5f554959ec531712f6e14a8cb8c90d87cc27932","ondrej/b177581bb230d89821d1e2e5e91f93bee3fc4192","ondrej/b6298b394e9eaefcfa2458cd56c345d778e99b8e","ondrej/be1e6499742e241d71c7e79434e278a0c89d141b","ondrej/c63b7fad498dbe56710b655bd296a58abba64bb8","ondrej/d7e5f7903de06e504aac4a3822a41d69e159e370","ondrej/e00b13ac6e5a49434fbe534b0cab86b9ee4fbdb5","ondrej/f8a0c0bed6ed629e314d22619510939c61d88b0e","ondrej/fb07c38697c9f4f76dcb921487c4f96813c99b69","v9.10.0a1","v9.10.0a2","v9.10.0b1","v9.10.0b2","v9.10.0rc1","v9.10.0rc2","v9.10.1","v9.10.1b1","v9.10.1b2","v9.10.1rc1","v9.10.1rc2","v9.10.2","v9.10.2b1","v9.10.2rc1","v9.10.2rc2","v9.10.3","v9.10.3b1","v9.10.3rc1","v9.10.4","v9.10.4-P1","v9.10.4-P2","v9.10.4-P3","v9.10.4-P4","v9.10.4b1","v9.10.4b2","v9.10.4b3","v9.10.4rc1","v9.11.0a1","v9.11.0a2","v9.11.0a3","v9.11.0b1","v9.11.0b2","v9.11.0b3","v9.11.0rc1","v9.12.0a1","v9.12.0b1","v9.12.0b2","v9.12.0rc1","v9.13.0","v9.13.2","v9.13.3","v9.13.4","v9.13.5","v9.13.6","v9.15.0","v9.15.2","v9.15.3","v9.15.4","v9.15.7","v9.15.8","v9.19.0","v9.5.0a1","v9.5.0a2","v9.5.0a3","v9.5.0a4","v9.5.0a5","v9.5.0a6","v9.7.0a1","v9.9.0","v9.9.0rc3","v9.9.0rc4","v9.9.1","v9.9.2b1","v9.9.2rc1","v9.9.3","v9.9.3b1","v9.9.3b2","v9.9.3rc1","v9.9.3rc2","v9.9.4","v9.9.4b1","v9.9.4rc2","v9.9.5","v9.9.5b1","v9.9.5rc1","v9.9.5rc2","v9.9.6","v9.9.6b1","v9.9.6b2","v9.9.6rc1","v9.9.6rc2","v9.9.7","v9.9.7b1","v9.9.7rc1","v9.9.7rc2","v9.9.8","v9.9.8b1","v9.9.8rc1","v9.9.9","v9.9.9-P1","v9.9.9-P2","v9.9.9-P3","v9.9.9-P4","v9.9.9b1","v9.9.9b2","v9.9.9rc1"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.2"}]},{"events":[{"introduced":"0"},{"last_affected":"7.3"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4"}]},{"events":[{"introduced":"0"},{"last_affected":"7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.7"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.2"}]},{"events":[{"introduced":"0"},{"last_affected":"7.3"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4"}]},{"events":[{"introduced":"0"},{"last_affected":"7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.7"}]},{"events":[{"introduced":"0"},{"last_affected":"7.2"}]},{"events":[{"introduced":"0"},{"last_affected":"7.3"}]},{"events":[{"introduced":"0"},{"last_affected":"7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.7"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-9131.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}