![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2002-0684 |
Description: | Buffer overflow in DNS resolver functions that perform lookup of network names and addresses, as used in BIND 4.9.8 and ported to glibc 2.2.5 and earlier, allows remote malicious DNS servers to execute arbitrary code through a subroutine used by functions such as getnetbyname and getnetbyaddr. |
Test IDs: | None available |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2002-0684 Bugtraq: 20020704 Re: Remote buffer overflow in resolver code of libc (Google Search) http://marc.info/?l=bugtraq&m=102581482511612&w=2 Cert/CC Advisory: CA-2002-19 CERT/CC vulnerability note: VU#542971 http://www.kb.cert.org/vuls/id/542971 Conectiva Linux advisory: CLSA-2002:507 http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000507 http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-050.php RedHat Security Advisories: RHSA-2002:139 http://rhn.redhat.com/errata/RHSA-2002-139.html SuSE Security Announcement: SuSE-SA:2002:026 (Google Search) |