ID

VAR-201702-0036


CVE

CVE-2016-6171


TITLE

Knot DNS Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2016-007547

DESCRIPTION

Knot DNS before 2.3.0 allows remote DNS servers to cause a denial of service (memory exhaustion and slave server crash) via a large zone transfer for (1) DDNS, (2) AXFR, or (3) IXFR. Multiple DNS Servers are prone to a remote denial-of-service vulnerability. An attacker can exploit this issue to cause a denial-of-service condition, denying service to legitimate users

Trust: 1.89

sources: NVD: CVE-2016-6171 // JVNDB: JVNDB-2016-007547 // BID: 91678

AFFECTED PRODUCTS

vendor:knot dnsmodel:knot dnsscope:ltversion:2.3.0

Trust: 1.0

vendor:cz nicmodel:knot dnsscope:ltversion:2.3.0

Trust: 0.8

vendor:knot dnsmodel:knot dnsscope:eqversion:2.2.1

Trust: 0.6

vendor:powerdnsmodel:authoritative serverscope:eqversion:3.4.7

Trust: 0.3

vendor:powerdnsmodel:authoritative serverscope:eqversion:3.4.6

Trust: 0.3

vendor:powerdnsmodel:authoritative serverscope:eqversion:3.4.5

Trust: 0.3

vendor:powerdnsmodel:authoritative serverscope:eqversion:3.4.4

Trust: 0.3

vendor:powerdnsmodel:authoritative serverscope:eqversion:3.4

Trust: 0.3

vendor:nsdmodel:nsdscope:eqversion:0

Trust: 0.3

vendor:knotmodel:dns knot dnsscope:eqversion:0

Trust: 0.3

vendor:powerdnsmodel:authoritative serverscope:neversion:4.0.0

Trust: 0.3

sources: BID: 91678 // JVNDB: JVNDB-2016-007547 // CNNVD: CNNVD-201607-079 // NVD: CVE-2016-6171

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-6171
value: HIGH

Trust: 1.0

NVD: CVE-2016-6171
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201607-079
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2016-6171
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

nvd@nist.gov: CVE-2016-6171
baseSeverity: HIGH
baseScore: 8.6
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 4.0
version: 3.1

Trust: 1.0

NVD: CVE-2016-6171
baseSeverity: HIGH
baseScore: 8.6
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2016-007547 // CNNVD: CNNVD-201607-079 // NVD: CVE-2016-6171

PROBLEMTYPE DATA

problemtype:CWE-400

Trust: 1.8

sources: JVNDB: JVNDB-2016-007547 // NVD: CVE-2016-6171

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201607-079

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201607-079

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-007547

PATCH

title:Knot DNS 2.3.0 (2016-08-09)url:https://gitlab.labs.nic.cz/labs/knot/blob/c546a70563ef4c7badb7cb5bdf6d1ba8e7adae82/NEWS

Trust: 0.8

title:Issue #464url:https://gitlab.labs.nic.cz/labs/knot/issues/464

Trust: 0.8

title:Knot DNS Remediation measures for denial of service vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=62671

Trust: 0.6

sources: JVNDB: JVNDB-2016-007547 // CNNVD: CNNVD-201607-079

EXTERNAL IDS

db:NVDid:CVE-2016-6171

Trust: 2.7

db:BIDid:91678

Trust: 1.9

db:OPENWALLid:OSS-SECURITY/2016/07/06/3

Trust: 1.6

db:OPENWALLid:OSS-SECURITY/2016/07/06/4

Trust: 1.6

db:JVNDBid:JVNDB-2016-007547

Trust: 0.8

db:CNNVDid:CNNVD-201607-079

Trust: 0.6

sources: BID: 91678 // JVNDB: JVNDB-2016-007547 // CNNVD: CNNVD-201607-079 // NVD: CVE-2016-6171

REFERENCES

url:https://github.com/sischkg/xfer-limit/blob/master/readme.md

Trust: 1.9

url:http://www.openwall.com/lists/oss-security/2016/07/06/3

Trust: 1.6

url:http://www.openwall.com/lists/oss-security/2016/07/06/4

Trust: 1.6

url:http://www.securityfocus.com/bid/91678

Trust: 1.6

url:https://gitlab.labs.nic.cz/labs/knot/blob/c546a70563ef4c7badb7cb5bdf6d1ba8e7adae82/news

Trust: 1.6

url:https://lists.dns-oarc.net/pipermail/dns-operations/2016-july/015058.html

Trust: 1.6

url:https://gitlab.labs.nic.cz/labs/knot/issues/464

Trust: 1.6

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-6171

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-6171

Trust: 0.8

url:https://github.com/powerdns/pdns/pull/4133

Trust: 0.3

url:https://lists.dns-oarc.net/pipermail/dns-operations/2016-july/015073.html

Trust: 0.3

sources: BID: 91678 // JVNDB: JVNDB-2016-007547 // CNNVD: CNNVD-201607-079 // NVD: CVE-2016-6171

CREDITS

The vendor reported this issue.

Trust: 0.3

sources: BID: 91678

SOURCES

db:BIDid:91678
db:JVNDBid:JVNDB-2016-007547
db:CNNVDid:CNNVD-201607-079
db:NVDid:CVE-2016-6171

LAST UPDATE DATE

2025-04-20T22:24:56.650000+00:00


SOURCES UPDATE DATE

db:BIDid:91678date:2016-07-07T00:00:00
db:JVNDBid:JVNDB-2016-007547date:2017-03-06T00:00:00
db:CNNVDid:CNNVD-201607-079date:2020-06-12T00:00:00
db:NVDid:CVE-2016-6171date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:BIDid:91678date:2016-07-07T00:00:00
db:JVNDBid:JVNDB-2016-007547date:2017-03-06T00:00:00
db:CNNVDid:CNNVD-201607-079date:2016-07-07T00:00:00
db:NVDid:CVE-2016-6171date:2017-02-09T15:59:01.190