CVE-2002-0684

Buffer overflow in DNS resolver functions that perform lookup of network names and addresses, as used in BIND 4.9.8 and ported to glibc 2.2.5 and earlier, allows remote malicious DNS servers to execute arbitrary code through a subroutine used by functions such as getnetbyname and getnetbyaddr.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:4.9.8:*:*:*:*:*:*:*

History

20 Nov 2024, 23:39

Type Values Removed Values Added
References () http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000507 - () http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000507 -
References () http://marc.info/?l=bugtraq&m=102581482511612&w=2 - () http://marc.info/?l=bugtraq&m=102581482511612&w=2 -
References () http://rhn.redhat.com/errata/RHSA-2002-139.html - Patch, Vendor Advisory () http://rhn.redhat.com/errata/RHSA-2002-139.html - Patch, Vendor Advisory
References () http://www.kb.cert.org/vuls/id/542971 - US Government Resource () http://www.kb.cert.org/vuls/id/542971 - US Government Resource
References () http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-050.php - () http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-050.php -

Information

Published : 2002-08-12 04:00

Updated : 2024-11-20 23:39


NVD link : CVE-2002-0684

Mitre link : CVE-2002-0684

CVE.ORG link : CVE-2002-0684


JSON object : View

Products Affected

isc

  • bind

gnu

  • glibc