named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 does not properly handle DNAME records when parsing fetch reply messages, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed packet to the rndc (aka control channel) interface, related to alist.c and sexpr.c.
                
            Metrics
Affected Vendors & Products
Advisories
    | Source | ID | Title | 
|---|---|---|
  Debian DSA | 
                DSA-3511-1 | bind9 security update | 
  Ubuntu USN | 
                USN-2925-1 | Bind vulnerabilities | 
Fixes
    Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
        History
                    Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        
        epss
         
  | 
    
        
        
        epss
         
  | 
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T22:48:13.763Z
Reserved: 2016-01-04T00:00:00
Link: CVE-2016-1285
Updated: 2024-08-05T22:48:13.763Z
Status : Deferred
Published: 2016-03-09T23:59:02.133
Modified: 2025-04-12T10:46:40.837
Link: CVE-2016-1285
                        OpenCVE Enrichment
                    No data.
 Debian DSA
 Ubuntu USN