Executive Summary

Informations
NameCVE-2002-0029First vendor Publication2002-11-29
VendorCveLast vendor Modification2008-09-10

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score7.5Attack RangeNetwork
Cvss Impact Score6.4Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Security Protection

ImpactsProvides user account access : Allows partial confidentiality, integrity, and availability violation; Allows unauthorized disclosure of information; Allows disruption of service.

Detail

Buffer overflows in the DNS stub resolver library in ISC BIND 4.9.2 through 4.9.10, and other derived libraries such as BSD libc and GNU glibc, allow remote attackers to execute arbitrary code via DNS server responses that trigger the overflow in the (1) getnetbyname, or (2) getnetbyaddr functions, aka "LIBRESOLV: buffer overrun" and a different vulnerability than CVE-2002-0684.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0029

CPE : Common Platform Enumeration

TypeDescriptionCount
Application9
Os9

OpenVAS Exploits

DateDescription
2009-05-05Name : HP-UX Update for BIND HPSBUX00233
File : nvt/gb_hp_ux_HPSBUX00233.nasl
2008-09-04Name : FreeBSD Ports: linux_base
File : nvt/freebsd_linux_base.nasl

Open Source Vulnerability Database (OSVDB)

idDescription
8330ISC BIND DNS stub resolver (libresolv.a) DNS Response Overflow

Snort® IPS/IDS

DateDescription
2014-01-10Red Hat Enterprise Linux DNS resolver buffer overflow attempt
RuleID : 15963 - Revision : 6 - Type : OS-LINUX

Nessus® Vulnerability Scanner

DateDescription
2005-07-13Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_bf2e7483d3fa440d8c6e8f1f2f018818.nasl - Type : ACT_GATHER_INFO
2004-09-29Name : The remote Debian host is missing a security-related update.
File : debian_DSA-196.nasl - Type : ACT_GATHER_INFO
2004-08-05Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2004-383.nasl - Type : ACT_GATHER_INFO
2003-09-29Name : It is possible to use the remote name server to execute arbitrary code on the...
File : bind_stub_res.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

SourceUrl
APPLE http://lists.apple.com/archives/Security-announce/2002/Nov/msg00000.html
BID http://www.securityfocus.com/bid/6186
CERT http://www.cert.org/advisories/CA-2002-31.html
CERT-VN http://www.kb.cert.org/vuls/id/844360
CONFIRM http://www.isc.org/products/BIND/bind-security.html
NETBSD ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-028.txt.asc
SGI ftp://patches.sgi.com/support/free/security/advisories/20021201-01-P
XF http://www.iss.net/security_center/static/10624.php

Alert History

If you want to see full details history, please login or register.
0
1
2
3
DateInformations
2016-04-26 12:05:11
  • Multiple Updates
2014-02-17 10:24:23
  • Multiple Updates
2014-01-19 21:21:36
  • Multiple Updates
2013-05-11 12:07:54
  • Multiple Updates