named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 does not properly handle DNAME records when parsing fetch reply messages, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed packet to the rndc (aka control channel) interface, related to alist.c and sexpr.c.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2016-03-09T23:00:00
Updated: 2024-08-05T22:48:13.763Z
Reserved: 2016-01-04T00:00:00
Link: CVE-2016-1285
Vulnrichment
Updated: 2024-08-05T22:48:13.763Z
NVD
Status : Modified
Published: 2016-03-09T23:59:02.133
Modified: 2024-11-21T02:46:06.697
Link: CVE-2016-1285
Redhat