named in ISC BIND 9.x before 9.9.9-P5, 9.10.x before 9.10.4-P5, and 9.11.x before 9.11.0-P2 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed response to an RTYPE ANY query.
{
"unresolved_ranges": [
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "7.0"
}
],
"cpe": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "7.2"
}
],
"cpe": "cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "7.3"
}
],
"cpe": "cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "7.4"
}
],
"cpe": "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "7.6"
}
],
"cpe": "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "7.7"
}
],
"cpe": "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "7.0"
}
],
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "7.2"
}
],
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "7.3"
}
],
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "7.4"
}
],
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "7.6"
}
],
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "7.7"
}
],
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "7.2"
}
],
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "7.3"
}
],
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "7.6"
}
],
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "7.7"
}
],
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "7.0"
}
],
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_workstation:7.0:*:*:*:*:*:*:*"
}
]
}{
"source": "CPE_FIELD",
"extracted_events": [
{
"introduced": "0"
},
{
"last_affected": "8.0"
},
{
"last_affected": "7.5"
}
],
"cpe": [
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"
]
}{
"source": "CPE_FIELD",
"extracted_events": [
{
"introduced": "9.0"
},
{
"last_affected": "9.9.8"
},
{
"introduced": "9.10.0"
},
{
"last_affected": "9.10.3"
},
{
"introduced": "0"
},
{
"last_affected": "9.9.9-NA"
},
{
"last_affected": "9.9.9-b1"
},
{
"last_affected": "9.9.9-b2"
},
{
"last_affected": "9.9.9-p1"
},
{
"last_affected": "9.9.9-p3"
},
{
"last_affected": "9.9.9-p4"
},
{
"last_affected": "9.10.4-b2"
},
{
"last_affected": "9.10.4-b3"
},
{
"last_affected": "9.10.4-p2"
},
{
"last_affected": "9.10.4-p3"
},
{
"last_affected": "9.10.4-p4"
},
{
"last_affected": "9.10.4-rc1"
},
{
"last_affected": "9.11.0-a1"
},
{
"last_affected": "9.11.0-a2"
},
{
"last_affected": "9.11.0-a3"
},
{
"last_affected": "9.11.0-b1"
},
{
"last_affected": "9.11.0-b2"
},
{
"last_affected": "9.11.0-b3"
},
{
"last_affected": "9.11.0-p1"
},
{
"last_affected": "9.11.0-rc1"
}
],
"cpe": [
"cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.9:-:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.9:b1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.9:b2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.9:p1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.9:p3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.9:p4:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.10.4:b2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.10.4:b3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.10.4:p2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.10.4:p3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.10.4:p4:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.10.4:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.11.0:a1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.11.0:a2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.11.0:a3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.11.0:b1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.11.0:b2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.11.0:b3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.11.0:p1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.11.0:rc1:*:*:*:*:*:*"
]
}