resolver.c in named in ISC BIND 9.10.x before 9.10.3-P4, when DNS cookies are enabled, allows remote attackers to cause a denial of service (INSIST assertion failure and daemon exit) via a malformed packet with more than one cookie option.
{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "9.10.0"
},
{
"introduced": "0"
},
{
"last_affected": "9.10.0-a1"
},
{
"introduced": "0"
},
{
"last_affected": "9.10.0-a2"
},
{
"introduced": "0"
},
{
"last_affected": "9.10.0-b1"
},
{
"introduced": "0"
},
{
"last_affected": "9.10.0-b2"
},
{
"introduced": "0"
},
{
"last_affected": "9.10.0-p1"
},
{
"introduced": "0"
},
{
"last_affected": "9.10.0-p2"
},
{
"introduced": "0"
},
{
"last_affected": "9.10.0-rc1"
},
{
"introduced": "0"
},
{
"last_affected": "9.10.0-rc2"
},
{
"introduced": "0"
},
{
"last_affected": "9.10.1"
},
{
"introduced": "0"
},
{
"last_affected": "9.10.1-b1"
},
{
"introduced": "0"
},
{
"last_affected": "9.10.1-b2"
},
{
"introduced": "0"
},
{
"last_affected": "9.10.1-p1"
},
{
"introduced": "0"
},
{
"last_affected": "9.10.1-p2"
},
{
"introduced": "0"
},
{
"last_affected": "9.10.1-rc1"
},
{
"introduced": "0"
},
{
"last_affected": "9.10.1-rc2"
},
{
"introduced": "0"
},
{
"last_affected": "9.10.2-b1"
},
{
"introduced": "0"
},
{
"last_affected": "9.10.2-p1"
},
{
"introduced": "0"
},
{
"last_affected": "9.10.2-p2"
},
{
"introduced": "0"
},
{
"last_affected": "9.10.2-p3"
},
{
"introduced": "0"
},
{
"last_affected": "9.10.2-p4"
},
{
"introduced": "0"
},
{
"last_affected": "9.10.2-rc1"
},
{
"introduced": "0"
},
{
"last_affected": "9.10.2-rc2"
},
{
"introduced": "0"
},
{
"last_affected": "9.10.3"
},
{
"introduced": "0"
},
{
"last_affected": "9.10.3-b1"
},
{
"introduced": "0"
},
{
"last_affected": "9.10.3-p1"
},
{
"introduced": "0"
},
{
"last_affected": "9.10.3-p2"
},
{
"introduced": "0"
},
{
"last_affected": "9.10.3-p3"
},
{
"introduced": "0"
},
{
"last_affected": "9.10.3-rc1"
}
]
}