Page 22 of 107 results (0.020 seconds)

CVSS: 5.0EPSS: 16%CPEs: 1EXPL: 0

The BIND 4 and BIND 8.2.x stub resolver libraries, and other libraries such as glibc 2.2.5 and earlier, libc, and libresolv, use the maximum buffer size instead of the actual size when processing a DNS response, which causes the stub resolvers to read past the actual boundary ("read buffer overflow"), allowing remote attackers to cause a denial of service (crash). Desbordamiento de búfer en el código de resolución de glib 2.2.5 y anteriores permite a atacantes remotos causar una denegación de servicio (caida) mediante una operación de lectura en paquetes DNS largos. • ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-015.txt.asc http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000535 http://www.iss.net/security_center/static/10295.php http://www.kb.cert.org/vuls/id/738331 http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:009 http://www.redhat.com/support/errata/RHSA-2002-197.html http://www.redhat.com/support/errata/RHSA-2002-258.html http://www.redhat.com/support/errata/RHSA-2003-022.html htt •

CVSS: 7.5EPSS: 1%CPEs: 2EXPL: 0

Buffer overflow in DNS resolver functions that perform lookup of network names and addresses, as used in BIND 4.9.8 and ported to glibc 2.2.5 and earlier, allows remote malicious DNS servers to execute arbitrary code through a subroutine used by functions such as getnetbyname and getnetbyaddr. Desbordamiento de búfer en las funciones de resolución de DNS que buscan nombres de red y direcciones, como en BIND 4.9.8 y glibc 2.2.5 y anteriores, permiten que servidores DNS remotos ejecuten código arbitrario por medio de una subrutina usada por funciones tales como getnetbyname y getnetbyaddr. • http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000507 http://marc.info/?l=bugtraq&m=102581482511612&w=2 http://rhn.redhat.com/errata/RHSA-2002-139.html http://www.kb.cert.org/vuls/id/542971 http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-050.php https://access.redhat.com/security/cve/CVE-2002-0684 https://bugzilla.redhat.com/show_bug.cgi?id=1616795 •