CVE-2002-0029
Published Nov 29, 2002
Last updated 16 years ago
Overview
- Description
- Buffer overflows in the DNS stub resolver library in ISC BIND 4.9.2 through 4.9.10, and other derived libraries such as BSD libc and GNU glibc, allow remote attackers to execute arbitrary code via DNS server responses that trigger the overflow in the (1) getnetbyname, or (2) getnetbyaddr functions, aka "LIBRESOLV: buffer overrun" and a different vulnerability than CVE-2002-0684.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:isc:bind:4.9.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6E820DA7-FF69-48AD-B031-3C583EFE3679" }, { "criteria": "cpe:2.3:a:isc:bind:4.9.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "94C41E69-3034-4E30-A99E-A2C3EE9AE337" }, { "criteria": "cpe:2.3:a:isc:bind:4.9.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "262EFABD-8349-4C34-8653-39767923C2DB" }, { "criteria": "cpe:2.3:a:isc:bind:4.9.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AB7F1274-7E0E-40C8-8006-ACFDBE757D35" }, { "criteria": "cpe:2.3:a:isc:bind:4.9.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8257C916-6F4D-4B7E-8EED-B2789B3B35AC" }, { "criteria": "cpe:2.3:a:isc:bind:4.9.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B959A2AB-703C-4354-8E23-809D2D13EC06" }, { "criteria": "cpe:2.3:a:isc:bind:4.9.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0064E411-C26F-4831-B7C4-63E2E1EF98DF" }, { "criteria": "cpe:2.3:a:isc:bind:4.9.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "982BB8D9-F396-4D99-A130-A2D8A5E61E3F" }, { "criteria": "cpe:2.3:a:isc:bind:4.9.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9CEBE5DC-7D81-404C-929A-B92951AADA14" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:astaro:security_linux:2.0.23:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BDC424CD-9B05-4643-9D05-A1ACC9B5E788" }, { "criteria": "cpe:2.3:o:astaro:security_linux:2.0.24:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "929C2102-C9DE-448D-B367-7FD90A238BC8" }, { "criteria": "cpe:2.3:o:astaro:security_linux:2.0.25:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "17D74044-DBBB-41CE-BA23-91F81FCB3050" }, { "criteria": "cpe:2.3:o:astaro:security_linux:2.0.26:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DDABBB48-8C12-49FC-ADCF-2BF1907A2439" }, { "criteria": "cpe:2.3:o:astaro:security_linux:2.0.27:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "556BD271-D766-4D36-BB9E-AE7345023D76" }, { "criteria": "cpe:2.3:o:astaro:security_linux:2.0.30:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "267E0669-8D08-4874-B98C-49B6CF018C71" }, { "criteria": "cpe:2.3:o:astaro:security_linux:3.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5F20757E-285F-46D1-B7B6-C0C90F0E3758" }, { "criteria": "cpe:2.3:o:astaro:security_linux:3.2.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "526601CE-5AE1-4AD4-896E-817A377F28C6" }, { "criteria": "cpe:2.3:o:astaro:security_linux:3.2.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "270D4B66-C834-4C9C-B7C3-FC8BE9128B2F" } ], "operator": "OR" } ] } ]