Page 4 of 23 results (0.014 seconds)

CVSS: 7.5EPSS: 93%CPEs: 18EXPL: 0

Buffer overflows in the DNS stub resolver library in ISC BIND 4.9.2 through 4.9.10, and other derived libraries such as BSD libc and GNU glibc, allow remote attackers to execute arbitrary code via DNS server responses that trigger the overflow in the (1) getnetbyname, or (2) getnetbyaddr functions, aka "LIBRESOLV: buffer overrun" and a different vulnerability than CVE-2002-0684. Desbordamientos de búfer en la libreria de resolución de raíz DNS en ISC BIND 4.9.2 a 4.9.10, y otras librerías derivadas como BSD libc y GNU libc, permite a atacantes remotos ejecutar código arbitrario mediante respuestas de servidor DNS que disparan el desbordamiento en las funciones getnetbyname() y getnetbyaddr(). También conocidad como "LIBRESOLV:desbordamiento de búfer. Es una vulnerabilidad distinta de CAN-2002-0684. • ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-028.txt.asc ftp://patches.sgi.com/support/free/security/advisories/20021201-01-P http://lists.apple.com/archives/Security-announce/2002/Nov/msg00000.html http://www.cert.org/advisories/CA-2002-31.html http://www.isc.org/products/BIND/bind-security.html http://www.iss.net/security_center/static/10624.php http://www.kb.cert.org/vuls/id/844360 http://www.securityfocus.com/bid/6186 https://access.redhat&# •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

dnskeygen in BIND 8.2.4 and earlier, and dnssec-keygen in BIND 9.1.2 and earlier, set insecure permissions for a HMAC-MD5 shared secret key file used for DNS Transactional Signatures (TSIG), which allows attackers to obtain the keys and perform dynamic DNS updates. • http://www.osvdb.org/5609 http://xforce.iss.net/alerts/advise78.php https://exchange.xforce.ibmcloud.com/vulnerabilities/6694 • CWE-276: Incorrect Default Permissions •

CVSS: 10.0EPSS: 0%CPEs: 5EXPL: 0

Buffer overflow in nslookupComplain function in BIND 4 allows remote attackers to gain root privileges. • http://www.cert.org/advisories/CA-2001-02.html http://www.nai.com/research/covert/advisories/047.asp http://www.redhat.com/support/errata/RHSA-2001-007.html http://www.securityfocus.com/bid/2307 •

CVSS: 5.0EPSS: 0%CPEs: 15EXPL: 0

BIND 4 and BIND 8 allow remote attackers to access sensitive information such as environment variables. • http://www.cert.org/advisories/CA-2001-02.html http://www.debian.org/security/2001/dsa-026 http://www.nai.com/research/covert/advisories/047.asp http://www.redhat.com/support/errata/RHSA-2001-007.html http://www.securityfocus.com/bid/2321 •

CVSS: 10.0EPSS: 0%CPEs: 5EXPL: 0

Format string vulnerability in nslookupComplain function in BIND 4 allows remote attackers to gain root privileges. • http://www.cert.org/advisories/CA-2001-02.html http://www.nai.com/research/covert/advisories/047.asp http://www.redhat.com/support/errata/RHSA-2001-007.html http://www.securityfocus.com/bid/2309 •