U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2016-2776

Change History

Initial CVE Analysis 11/02/2016 11:21:23 AM

Action Type Old Value New Value
Changed CPE Configuration
Configuration 1
     OR
          *cpe:2.3:a:isc:bind:9.11.0:rc1:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.11.0:b3:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.11.0:b2:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.11.0:a1:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.11.0:a2:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.11.0:a3:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.11.0:b1:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.0:*:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.0:a1:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.0:a2:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.0:b1:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.0:b2:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.0:p1:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.0:p2:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.0:rc1:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.0:rc2:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.1:*:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.1:b1:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.1:b2:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.1:p1:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.1:p2:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.1:rc1:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.1:rc2:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.2:b1:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.2:p1:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.2:p2:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.2:p3:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.2:p4:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.2:rc1:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.2:rc2:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.3:*:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.3:b1:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.3:p1:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.3:p2:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.3:p3:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.3:p4:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.3:rc1:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.4:p2:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.4:p3:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.9.9:p3:*:*:*:*:*:* (and previous)
Configuration 1
     OR
          *cpe:2.3:a:isc:bind:9.11.0:rc1:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.11.0:b3:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.11.0:b2:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.11.0:a1:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.11.0:a2:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.11.0:a3:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.11.0:b1:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.0:*:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.0:a1:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.0:a2:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.0:b1:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.0:b2:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.0:p1:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.0:p2:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.0:rc1:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.0:rc2:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.1:*:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.1:b1:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.1:b2:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.1:p1:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.1:p2:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.1:rc1:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.1:rc2:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.2:b1:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.2:p1:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.2:p2:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.2:p3:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.2:p4:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.2:rc1:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.2:rc2:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.3:*:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.3:b1:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.3:p1:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.3:p2:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.3:p3:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.3:p4:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.3:rc1:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.4:p2:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.10.4:p3:*:*:*:*:*:*
          *cpe:2.3:a:isc:bind:9.9.9:p3:*:*:*:*:*:* (and previous)
Configuration 2
     OR
          *cpe:2.3:o:hp:hp-ux:11.31:*:*:*:*:*:*:*
Configuration 3
     OR
          *cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
          *cpe:2.3:o:oracle:solaris:10.0:*:*:*:*:*:*:*
Configuration 4
     OR
          *cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:*:*
          *cpe:2.3:o:oracle:vm_server:3.3:*:*:*:*:*:*:*
          *cpe:2.3:o:oracle:vm_server:3.2:*:*:*:*:*:*:*
Configuration 5
     OR
          *cpe:2.3:o:oracle:linux:7.0:*:*:*:*:*:*:*
          *cpe:2.3:o:oracle:linux:6.0:*:*:*:*:*:*:*
          *cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*
Changed Reference Type
http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html No Types Assigned
http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html Third Party Advisory
Changed Reference Type
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html No Types Assigned
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html Third Party Advisory
Changed Reference Type
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html No Types Assigned
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html Third Party Advisory
Changed Reference Type
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05321107 No Types Assigned
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05321107 Third Party Advisory