CVE-2002-0029
https://notcve.org/view.php?id=CVE-2002-0029
Buffer overflows in the DNS stub resolver library in ISC BIND 4.9.2 through 4.9.10, and other derived libraries such as BSD libc and GNU glibc, allow remote attackers to execute arbitrary code via DNS server responses that trigger the overflow in the (1) getnetbyname, or (2) getnetbyaddr functions, aka "LIBRESOLV: buffer overrun" and a different vulnerability than CVE-2002-0684. Desbordamientos de búfer en la libreria de resolución de raíz DNS en ISC BIND 4.9.2 a 4.9.10, y otras librerías derivadas como BSD libc y GNU libc, permite a atacantes remotos ejecutar código arbitrario mediante respuestas de servidor DNS que disparan el desbordamiento en las funciones getnetbyname() y getnetbyaddr(). También conocidad como "LIBRESOLV:desbordamiento de búfer. Es una vulnerabilidad distinta de CAN-2002-0684. • ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-028.txt.asc ftp://patches.sgi.com/support/free/security/advisories/20021201-01-P http://lists.apple.com/archives/Security-announce/2002/Nov/msg00000.html http://www.cert.org/advisories/CA-2002-31.html http://www.isc.org/products/BIND/bind-security.html http://www.iss.net/security_center/static/10624.php http://www.kb.cert.org/vuls/id/844360 http://www.securityfocus.com/bid/6186 https://access.redhat •
CVE-2002-0684
https://notcve.org/view.php?id=CVE-2002-0684
Buffer overflow in DNS resolver functions that perform lookup of network names and addresses, as used in BIND 4.9.8 and ported to glibc 2.2.5 and earlier, allows remote malicious DNS servers to execute arbitrary code through a subroutine used by functions such as getnetbyname and getnetbyaddr. Desbordamiento de búfer en las funciones de resolución de DNS que buscan nombres de red y direcciones, como en BIND 4.9.8 y glibc 2.2.5 y anteriores, permiten que servidores DNS remotos ejecuten código arbitrario por medio de una subrutina usada por funciones tales como getnetbyname y getnetbyaddr. • http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000507 http://marc.info/?l=bugtraq&m=102581482511612&w=2 http://rhn.redhat.com/errata/RHSA-2002-139.html http://www.kb.cert.org/vuls/id/542971 http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-050.php https://access.redhat.com/security/cve/CVE-2002-0684 https://bugzilla.redhat.com/show_bug.cgi?id=1616795 •
CVE-2002-0651
https://notcve.org/view.php?id=CVE-2002-0651
Buffer overflow in the DNS resolver code used in libc, glibc, and libbind, as derived from ISC BIND, allows remote malicious DNS servers to cause a denial of service and possibly execute arbitrary code via the stub resolvers. • ftp://ftp.NetBSD.ORG/pub/NetBSD/security/advisories/NetBSD-SA2002-006.txt.asc ftp://ftp.caldera.com/pub/updates/OpenServer/CSSA-2002-SCO.39 ftp://ftp.caldera.com/pub/updates/UnixWare/CSSA-2002-SCO.37 ftp://patches.sgi.com/support/free/security/advisories/20020701-01-I http://archives.neohapsis.com/archives/aix/2002-q3/0001.html http://archives.neohapsis.com/archives/linux/engarde/2002-q3/0002.html http://archives.neohapsis.com/archives/ntbugtraq/2002-q3/0000.html http://di •
CVE-2002-0400
https://notcve.org/view.php?id=CVE-2002-0400
ISC BIND 9 before 9.2.1 allows remote attackers to cause a denial of service (shutdown) via a malformed DNS packet that triggers an error condition that is not properly handled when the rdataset parameter to the dns_message_findtype() function in message.c is not NULL, aka DoS_findtype. • ftp://ftp.caldera.com/pub/updates/OpenUNIX/CSSA-2002-SCO.24.1/CSSA-2002-SCO.24.1.txt http://archives.neohapsis.com/archives/hp/2002-q3/0022.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000494 http://frontal2.mandriva.com/security/advisories?name=MDKSA-2002:038 http://www.cert.org/advisories/CA-2002-15.html http://www.isc.org/index.pl?/sw/bind/bind-security.php http://www.iss.net/security_center/static/9250.php http://www.kb.cert.org/vuls •
CVE-2001-0497
https://notcve.org/view.php?id=CVE-2001-0497
dnskeygen in BIND 8.2.4 and earlier, and dnssec-keygen in BIND 9.1.2 and earlier, set insecure permissions for a HMAC-MD5 shared secret key file used for DNS Transactional Signatures (TSIG), which allows attackers to obtain the keys and perform dynamic DNS updates. • http://www.osvdb.org/5609 http://xforce.iss.net/alerts/advise78.php https://exchange.xforce.ibmcloud.com/vulnerabilities/6694 • CWE-276: Incorrect Default Permissions •