{"id":"CVE-2016-9131","details":"named in ISC BIND 9.x before 9.9.9-P5, 9.10.x before 9.10.4-P5, and 9.11.x before 9.11.0-P2 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed response to an RTYPE ANY query.","modified":"2026-05-18T05:48:24.247449090Z","published":"2017-01-12T06:59:00.250Z","related":["CGA-vr7h-f33q-jgjr","SUSE-SU-2017:0111-1","SUSE-SU-2017:0112-1","SUSE-SU-2017:0113-1","openSUSE-SU-2024:10650-1"],"database_specific":{"unresolved_ranges":[{"vendor_product":"debian:debian_linux","extracted_events":[{"last_affected":"8.0"}],"source":"CPE_FIELD","cpes":["cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"]},{"vendor_product":"redhat:enterprise_linux_desktop","extracted_events":[{"last_affected":"7.0"}],"source":"CPE_FIELD","cpes":["cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"]},{"extracted_events":[{"last_affected":"7.2"},{"last_affected":"7.3"},{"last_affected":"7.4"},{"last_affected":"7.5"},{"last_affected":"7.6"},{"last_affected":"7.7"}],"vendor_product":"redhat:enterprise_linux_eus","source":"CPE_FIELD","cpes":["cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"]},{"vendor_product":"redhat:enterprise_linux_server","extracted_events":[{"last_affected":"7.0"}],"source":"CPE_FIELD","cpes":["cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"]},{"vendor_product":"redhat:enterprise_linux_server_aus","extracted_events":[{"last_affected":"7.2"},{"last_affected":"7.3"},{"last_affected":"7.4"},{"last_affected":"7.6"},{"last_affected":"7.7"}],"source":"CPE_FIELD","cpes":["cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"]},{"vendor_product":"redhat:enterprise_linux_server_tus","extracted_events":[{"last_affected":"7.2"},{"last_affected":"7.3"},{"last_affected":"7.6"},{"last_affected":"7.7"}],"source":"CPE_FIELD","cpes":["cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"]},{"vendor_product":"redhat:enterprise_linux_server_workstation","extracted_events":[{"last_affected":"7.0"}],"source":"CPE_FIELD","cpes":["cpe:2.3:o:redhat:enterprise_linux_server_workstation:7.0:*:*:*:*:*:*:*"]}]},"references":[{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0062.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2017/dsa-3758"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/95386"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1037582"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1583"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201708-01"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20180926-0005/"},{"type":"FIX","url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05381687"},{"type":"FIX","url":"https://kb.isc.org/article/AA-01439/74/CVE-2016-9131"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/isc-projects/bind9","events":[{"introduced":"19d6c56085e97cf4ac559cdc27edd624127bcb32"},{"last_affected":"2d6d4babba5b5d2237bd37c0e4c3c993b7efd255"},{"introduced":"63fbb3ea39094353765c04a6066b9e1d1013992a"},{"last_affected":"2799933bc6790356d4b3eebdfe21dc0f87977f14"},{"introduced":"0"},{"last_affected":"b7843f9794be456c53d7dc0b51ead89f2c5d3351"},{"last_affected":"9833cd85a811d3a4313948f324d3906937633e65"},{"last_affected":"d6d860e96ed5b20c1a77d5d19a29194174a1e5a0"},{"last_affected":"1b68143f200f6b88cc7d395f600e63b5c28362c8"},{"last_affected":"53185941dd83e11acf5ea5ebca9748987159803a"},{"last_affected":"d36f894b881427035c9163b939cb64c75e6fdd7a"},{"last_affected":"2f98c1c2a0b92c83cd9a9e6d53363537f4819c40"},{"last_affected":"853aa4b2e04de28173429fc24780b21fadb5cef5"},{"last_affected":"cea32f84f0d063ca525336f54f3bb1127ee0f5fa"},{"last_affected":"dca6957b62013f523e54084c92152f571d08f6c0"},{"last_affected":"111ec860a840d09dbd0551044e5fdc37d546c6b6"},{"last_affected":"a23f742c3d767f41bfb1a143b0605a766936c4d9"},{"last_affected":"e0815f81205101e6fce3aa87dead307ea9624df3"}],"database_specific":{"cpe":["cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.9.9:-:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.9.9:b1:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.9.9:b2:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.9.9:p1:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.9.9:p3:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.9.9:p4:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.10.4:b2:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.10.4:b3:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.10.4:p2:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.10.4:p3:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.10.4:p4:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.10.4:rc1:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.11.0:a1:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.11.0:a2:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.11.0:a3:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.11.0:b1:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.11.0:b2:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.11.0:b3:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.11.0:p1:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.11.0:rc1:*:*:*:*:*:*"],"extracted_events":[{"introduced":"9.0"},{"last_affected":"9.9.8"},{"introduced":"9.10.0"},{"last_affected":"9.10.3"},{"introduced":"0"},{"last_affected":"9.9.9-NA"},{"last_affected":"9.9.9-b1"},{"last_affected":"9.9.9-b2"},{"last_affected":"9.9.9-p1"},{"last_affected":"9.9.9-p3"},{"last_affected":"9.9.9-p4"},{"last_affected":"9.10.4-b2"},{"last_affected":"9.10.4-b3"},{"last_affected":"9.10.4-p2"},{"last_affected":"9.10.4-p3"},{"last_affected":"9.10.4-p4"},{"last_affected":"9.10.4-rc1"},{"last_affected":"9.11.0-a1"},{"last_affected":"9.11.0-a2"},{"last_affected":"9.11.0-a3"},{"last_affected":"9.11.0-b1"},{"last_affected":"9.11.0-b2"},{"last_affected":"9.11.0-b3"},{"last_affected":"9.11.0-p1"},{"last_affected":"9.11.0-rc1"}],"source":"CPE_FIELD"}}],"versions":["v9.9.9-P4","v9.10.4-P4","v9.9.9-P3","v9.10.4-P3","v9.10.4-P2","v9.9.9-P2","v9.11.0rc1","v9.11.0b3","v9.11.0b2","v9.9.9-P1","v9.11.0b1","v9.11.0a3","v9.10.4-P1","v9.11.0a2","v9.9.9","v9.10.4","v9.9.9rc1","v9.10.4rc1","v9.9.9b2","v9.10.4b3","v9.11.0a1","v9.10.4b2","v9.9.9b1","v9.10.4b1","v9.9.8","v9.10.3","v9.9.8rc1","v9.10.3rc1","v9.9.8b1","v9.10.3b1","v9.9.7","v9.10.2","v9.9.7rc2","v9.10.2rc2","v9.9.7rc1","v9.10.2rc1","v9.10.2b1","v9.9.7b1","v9.9.6","v9.10.1","v9.9.6rc2","v9.10.1rc2","v9.9.6rc1","v9.10.1rc1","v9.9.6b2","v9.10.1b2","v9.9.6b1","v9.10.1b1","v9.10.0rc2","v9.10.0rc1","v9.10.0b2","v9.10.0b1","v9.10.0a2","v9.9.5","v9.9.5rc2","v9.9.5rc1","v9.9.5b1","v9.10.0a1","v9.9.4","v9.9.4rc2","v9.9.4b1","v9.9.3","v9.9.3rc2","v9.9.3rc1","v9.9.3b2","v9.9.3b1","v9.9.2rc1","v9.9.2b1","v9.9.1","v9.9.0","v9.9.0rc4","v9.9.0rc3","v9.7.0a1","v9.5.0a6","v9.5.0a5","v9.5.0a4","v9.5.0a3","v9.5.0a2","v9.5.0a1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-9131.json"}},{"ranges":[{"type":"GIT","repo":"https://gitlab.isc.org/isc-projects/bind9","events":[{"introduced":"19d6c56085e97cf4ac559cdc27edd624127bcb32"},{"last_affected":"2d6d4babba5b5d2237bd37c0e4c3c993b7efd255"},{"introduced":"63fbb3ea39094353765c04a6066b9e1d1013992a"},{"last_affected":"2799933bc6790356d4b3eebdfe21dc0f87977f14"},{"introduced":"0"},{"last_affected":"b7843f9794be456c53d7dc0b51ead89f2c5d3351"},{"last_affected":"9833cd85a811d3a4313948f324d3906937633e65"},{"last_affected":"d6d860e96ed5b20c1a77d5d19a29194174a1e5a0"},{"last_affected":"1b68143f200f6b88cc7d395f600e63b5c28362c8"},{"last_affected":"53185941dd83e11acf5ea5ebca9748987159803a"},{"last_affected":"d36f894b881427035c9163b939cb64c75e6fdd7a"},{"last_affected":"2f98c1c2a0b92c83cd9a9e6d53363537f4819c40"},{"last_affected":"853aa4b2e04de28173429fc24780b21fadb5cef5"},{"last_affected":"cea32f84f0d063ca525336f54f3bb1127ee0f5fa"},{"last_affected":"dca6957b62013f523e54084c92152f571d08f6c0"},{"last_affected":"111ec860a840d09dbd0551044e5fdc37d546c6b6"},{"last_affected":"a23f742c3d767f41bfb1a143b0605a766936c4d9"},{"last_affected":"e0815f81205101e6fce3aa87dead307ea9624df3"}],"database_specific":{"cpe":["cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.9.9:-:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.9.9:b1:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.9.9:b2:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.9.9:p1:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.9.9:p3:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.9.9:p4:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.10.4:b2:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.10.4:b3:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.10.4:p2:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.10.4:p3:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.10.4:p4:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.10.4:rc1:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.11.0:a1:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.11.0:a2:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.11.0:a3:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.11.0:b1:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.11.0:b2:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.11.0:b3:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.11.0:p1:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.11.0:rc1:*:*:*:*:*:*"],"extracted_events":[{"introduced":"9.0"},{"last_affected":"9.9.8"},{"introduced":"9.10.0"},{"last_affected":"9.10.3"},{"introduced":"0"},{"last_affected":"9.9.9-NA"},{"last_affected":"9.9.9-b1"},{"last_affected":"9.9.9-b2"},{"last_affected":"9.9.9-p1"},{"last_affected":"9.9.9-p3"},{"last_affected":"9.9.9-p4"},{"last_affected":"9.10.4-b2"},{"last_affected":"9.10.4-b3"},{"last_affected":"9.10.4-p2"},{"last_affected":"9.10.4-p3"},{"last_affected":"9.10.4-p4"},{"last_affected":"9.10.4-rc1"},{"last_affected":"9.11.0-a1"},{"last_affected":"9.11.0-a2"},{"last_affected":"9.11.0-a3"},{"last_affected":"9.11.0-b1"},{"last_affected":"9.11.0-b2"},{"last_affected":"9.11.0-b3"},{"last_affected":"9.11.0-p1"},{"last_affected":"9.11.0-rc1"}],"source":"CPE_FIELD"}}],"versions":["v9.9.9-P4","v9.10.4-P4","v9.9.9-P3","v9.10.4-P3","v9.10.4-P2","v9.9.9-P2","v9.11.0rc1","v9.11.0b3","v9.11.0b2","v9.9.9-P1","v9.11.0b1","v9.11.0a3","v9.10.4-P1","v9.11.0a2","v9.9.9","v9.10.4","v9.9.9rc1","v9.10.4rc1","v9.9.9b2","v9.10.4b3","v9.11.0a1","v9.10.4b2","v9.9.9b1","v9.10.4b1","v9.9.8","v9.10.3","v9.9.8rc1","v9.10.3rc1","v9.9.8b1","v9.10.3b1","v9.9.7","v9.10.2","v9.9.7rc2","v9.10.2rc2","v9.9.7rc1","v9.10.2rc1","v9.10.2b1","v9.9.7b1","v9.9.6","v9.10.1","v9.9.6rc2","v9.10.1rc2","v9.9.6rc1","v9.10.1rc1","v9.9.6b2","v9.10.1b2","v9.9.6b1","v9.10.1b1","v9.10.0rc2","v9.10.0rc1","v9.10.0b2","v9.10.0b1","v9.10.0a2","v9.9.5","v9.9.5rc2","v9.9.5rc1","v9.9.5b1","v9.10.0a1","v9.9.4","v9.9.4rc2","v9.9.4b1","v9.9.3","v9.9.3rc2","v9.9.3rc1","v9.9.3b2","v9.9.3b1","v9.9.2rc1","v9.9.2b1","v9.9.1","v9.9.0","v9.9.0rc4","v9.9.0rc3","v9.7.0a1","v9.5.0a6","v9.5.0a5","v9.5.0a4","v9.5.0a3","v9.5.0a2","v9.5.0a1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-9131.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}