Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E3CCD459-9E6D-4731-8054-CDF8B58454A9", "vulnerable": true}, {"criteria": "cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*", "matchCriteriaId": "CC7A498A-A669-4C42-8134-86103C799D13", "vulnerable": true}, {"criteria": "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*", "matchCriteriaId": "104DA87B-DEE4-4262-AE50-8E6BC43B228B", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:oracle:vm_server:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "5FEC7F7E-AA94-4405-93D6-D0194A37D3C9", "vulnerable": true}, {"criteria": "cpe:2.3:o:oracle:vm_server:3.3:*:*:*:*:*:*:*", "matchCriteriaId": "C2D62B2C-40E5-41B7-9DAA-029BCD079054", "vulnerable": true}, {"criteria": "cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:*:*", "matchCriteriaId": "4BA58099-26F7-4B01-B9FC-275F012FE9C6", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:isc:bind:*:p3:*:*:*:*:*:*", "matchCriteriaId": "301946B1-A4F0-4123-BAF9-ACDDBA5DFB23", "versionEndIncluding": "9.9.9", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:bind:9.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "92ECA27E-4248-49BD-A84C-4854CCA19AC5", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:bind:9.10.0:a1:*:*:*:*:*:*", "matchCriteriaId": "8B0C031F-96F1-4117-83B7-82EE749FC6BB", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:bind:9.10.0:a2:*:*:*:*:*:*", "matchCriteriaId": "F5D7D5B7-5696-4B51-954E-F32DF9617D9E", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:bind:9.10.0:b1:*:*:*:*:*:*", "matchCriteriaId": "2B953804-C53B-4C77-AAE4-C60961C23A39", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:bind:9.10.0:b2:*:*:*:*:*:*", "matchCriteriaId": "51BBFF21-4E77-44EC-B472-6925904772AC", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:bind:9.10.0:p1:*:*:*:*:*:*", "matchCriteriaId": "8FAA10DC-71AC-4E56-900A-B69B24917DE7", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:bind:9.10.0:p2:*:*:*:*:*:*", "matchCriteriaId": "9A0C5E26-B896-449D-B004-337C9C0C40F5", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:bind:9.10.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "444326E3-9D0D-4C9F-9B86-2AB6ADE1F405", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:bind:9.10.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "812CD568-82C1-4F44-99BA-1F1DF3AF16EF", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:bind:9.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "16EB6777-8E49-4B07-B859-06D0C2F29DC8", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:bind:9.10.1:b1:*:*:*:*:*:*", "matchCriteriaId": "A2574190-E1DC-46B9-AE82-5581960D8819", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:bind:9.10.1:b2:*:*:*:*:*:*", "matchCriteriaId": "5EB06ECC-D36F-4BE7-93BF-8B1C025298EA", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:bind:9.10.1:p1:*:*:*:*:*:*", "matchCriteriaId": "54E5A7DC-D432-470A-B95A-AF8EE1ECB561", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:bind:9.10.1:p2:*:*:*:*:*:*", "matchCriteriaId": "A6F3181D-BB94-4700-A66C-8503B7B4107C", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:bind:9.10.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "8EB2A5D6-DEDF-4962-8117-2F1FADB5B984", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:bind:9.10.1:rc2:*:*:*:*:*:*", "matchCriteriaId": "26B6584A-707A-463C-BB2F-1D663FE50C01", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:bind:9.10.2:b1:*:*:*:*:*:*", "matchCriteriaId": "D35C161A-3CCC-4FFC-9698-98FAE71BBF2F", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:bind:9.10.2:p1:*:*:*:*:*:*", "matchCriteriaId": "6518FD7D-0249-4793-9531-E5338EEC4C7B", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:bind:9.10.2:p2:*:*:*:*:*:*", "matchCriteriaId": "D468B433-D785-4A5B-A8CC-B2F1B27BAB7C", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:bind:9.10.2:p3:*:*:*:*:*:*", "matchCriteriaId": "7BCF9BD9-F557-408C-9CD7-BD0EAD66366F", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:bind:9.10.2:p4:*:*:*:*:*:*", "matchCriteriaId": "407F36C2-886C-48A7-A3AB-E5F9194775D0", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:bind:9.10.2:rc1:*:*:*:*:*:*", "matchCriteriaId": "24CEA3F3-C4F8-4BD1-92EA-AC1B54A3CFE6", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:bind:9.10.2:rc2:*:*:*:*:*:*", "matchCriteriaId": "574C2F69-C5A0-48C6-8F13-C164518B8ED8", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:bind:9.10.3:*:*:*:*:*:*:*", "matchCriteriaId": "40BD4A8C-785C-4460-AB52-B249C5DC9BC3", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:bind:9.10.3:b1:*:*:*:*:*:*", "matchCriteriaId": "6AAE7145-F1BA-4BEA-841E-DEE08891A3D5", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:bind:9.10.3:p1:*:*:*:*:*:*", "matchCriteriaId": "88359A5D-CE32-4920-BE5D-98EC262B41EB", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:bind:9.10.3:p2:*:*:*:*:*:*", "matchCriteriaId": "B77760E4-57C5-4A5E-A169-C84409930757", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:bind:9.10.3:p3:*:*:*:*:*:*", "matchCriteriaId": "24E9CBCA-241C-4EF6-8C0C-FA32E81B8B7C", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:bind:9.10.3:p4:*:*:*:*:*:*", "matchCriteriaId": "26660046-EF34-4D58-9873-97819ECDD196", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:bind:9.10.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "893ACAAC-406E-4A1C-970B-A15B42961271", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:bind:9.10.4:p2:*:*:*:*:*:*", "matchCriteriaId": "E253BD9F-25B8-42E7-BEAB-E843381ED155", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:bind:9.10.4:p3:*:*:*:*:*:*", "matchCriteriaId": "6B5E42E5-27C6-4D6F-B7DC-903B10BF2017", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:bind:9.11.0:a1:*:*:*:*:*:*", "matchCriteriaId": "D72B0718-8054-4C8C-8FAF-0DC79C3B4D4D", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:bind:9.11.0:a2:*:*:*:*:*:*", "matchCriteriaId": "4F155EC7-B84E-4C05-908A-BFBAF2CE612D", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:bind:9.11.0:a3:*:*:*:*:*:*", "matchCriteriaId": "C6C3D04E-B352-4124-A8A5-68AA90EC95DC", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:bind:9.11.0:b1:*:*:*:*:*:*", "matchCriteriaId": "E053C268-5C5F-4ED4-91CF-F8F795185C25", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:bind:9.11.0:b2:*:*:*:*:*:*", "matchCriteriaId": "ED1A5978-3E4E-4E1C-9D45-8AFA65704F37", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:bind:9.11.0:b3:*:*:*:*:*:*", "matchCriteriaId": "EF7673FD-B816-45D5-82DD-D2BD0261D2AC", "vulnerable": true}, {"criteria": "cpe:2.3:a:isc:bind:9.11.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "1ADDCEF4-E744-4F78-B4CC-1C9278167F29", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:hp:hp-ux:11.31:*:*:*:*:*:*:*", "matchCriteriaId": "0FC82871-E47F-4431-AAE0-A714D7D22670", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:oracle:solaris:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "FC633250-EB1E-4484-9BCB-977C8F9EB0B2", "vulnerable": true}, {"criteria": "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*", "matchCriteriaId": "79A602C5-61FE-47BA-9786-F045B6C6DBA8", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "buffer.c in named in ISC BIND 9 before 9.9.9-P3, 9.10.x before 9.10.4-P3, and 9.11.x before 9.11.0rc3 does not properly construct responses, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted query."}, {"lang": "es", "value": "buffer.c en named en ISC BIND 9 en versiones anteriores a 9.9.9-P3, 9.10.x en versiones anteriores a 9.10.4-P3 y 9.11.x en versiones anteriores a 9.11.0rc3 no construye respuestas adecuadamente, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (fallo de aserci\u00f3n y salida de demonio) a trav\u00e9s de una consulta manipulada."}], "id": "CVE-2016-2776", "lastModified": "2025-04-12T10:46:40.837", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0"}, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2016-09-28T10:59:00.157", "references": [{"source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2016-1944.html"}, {"source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2016-1945.html"}, {"source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2016-2099.html"}, {"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html"}, {"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html"}, {"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html"}, {"source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/93188"}, {"source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1036903"}, {"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05321107"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://kb.isc.org/article/AA-01419/0"}, {"source": "cve@mitre.org", "url": "https://kb.isc.org/article/AA-01435"}, {"source": "cve@mitre.org", "url": "https://kb.isc.org/article/AA-01436"}, {"source": "cve@mitre.org", "url": "https://kb.isc.org/article/AA-01438"}, {"source": "cve@mitre.org", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:28.bind.asc"}, {"source": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/201610-07"}, {"source": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20160930-0001/"}, {"source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/40453/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-1944.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-1945.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-2099.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/93188"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1036903"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05321107"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://kb.isc.org/article/AA-01419/0"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://kb.isc.org/article/AA-01435"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://kb.isc.org/article/AA-01436"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://kb.isc.org/article/AA-01438"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:28.bind.asc"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201610-07"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20160930-0001/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/40453/"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-20"}], "source": "nvd@nist.gov", "type": "Primary"}]}