Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2002-0684

Overview

Vulnerability Score 7.5 7.5
CVE Id CVE-2002-0684
Last Modified 05 Sep 2008 04:28:40
Published 12 Aug 2002 12:00:00
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact PARTIAL PARTIAL
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2002-0684

Summary

Buffer overflow in DNS resolver functions that perform lookup of network names and addresses, as used in BIND 4.9.8 and ported to glibc 2.2.5 and earlier, allows remote malicious DNS servers to execute arbitrary code through a subroutine used by functions such as getnetbyname and getnetbyaddr.

Vulnerable Systems

Application

  • Gnu Glibc 2.2.5

  • Isc Bind 4.9.8


References

CERT-VN - VU#542971

REDHAT - RHSA-2002:139

MANDRAKE - MDKSA-2002:050

BUGTRAQ - 20020704 Re: Remote buffer overflow in resolver code of libc

CONECTIVA - CLSA-2002:507


Last Updated: 27 May 2016 10:37:02