Buffer overflow in DNS resolver functions that perform lookup of network names and addresses, as used in BIND 4.9.8 and ported to glibc 2.2.5 and earlier, allows remote malicious DNS servers to execute arbitrary code through a subroutine used by functions such as getnetbyname and getnetbyaddr.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:39
Type | Values Removed | Values Added |
---|---|---|
References | () http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000507 - | |
References | () http://marc.info/?l=bugtraq&m=102581482511612&w=2 - | |
References | () http://rhn.redhat.com/errata/RHSA-2002-139.html - Patch, Vendor Advisory | |
References | () http://www.kb.cert.org/vuls/id/542971 - US Government Resource | |
References | () http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-050.php - |
Information
Published : 2002-08-12 04:00
Updated : 2024-11-20 23:39
NVD link : CVE-2002-0684
Mitre link : CVE-2002-0684
CVE.ORG link : CVE-2002-0684
JSON object : View
Products Affected
isc
- bind
gnu
- glibc
CWE