Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2002-0029
HistoryNov 29, 2002 - 5:00 a.m.

CVE-2002-0029

2002-11-2905:00:00
Debian Security Bug Tracker
security-tracker.debian.org
17

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.936 High

EPSS

Percentile

99.1%

Buffer overflows in the DNS stub resolver library in ISC BIND 4.9.2 through 4.9.10, and other derived libraries such as BSD libc and GNU glibc, allow remote attackers to execute arbitrary code via DNS server responses that trigger the overflow in the (1) getnetbyname, or (2) getnetbyaddr functions, aka “LIBRESOLV: buffer overrun” and a different vulnerability than CVE-2002-0684.

OSVersionArchitecturePackageVersionFilename
Debian12allbind9< 1:9.18.24-1bind9_1:9.18.24-1_all.deb
Debian11allbind9< 1:9.16.48-1bind9_1:9.16.48-1_all.deb
Debian999allbind9< 1:9.19.24-185-g392e7199df2-1bind9_1:9.19.24-185-g392e7199df2-1_all.deb
Debian13allbind9< 1:9.19.24-185-g392e7199df2-1bind9_1:9.19.24-185-g392e7199df2-1_all.deb

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.936 High

EPSS

Percentile

99.1%