Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2002-0684 | First vendor Publication | 2002-08-12 |
Vendor | Cve | Last vendor Modification | 2016-10-18 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Buffer overflow in DNS resolver functions that perform lookup of network names and addresses, as used in BIND 4.9.8 and ported to glibc 2.2.5 and earlier, allows remote malicious DNS servers to execute arbitrary code through a subroutine used by functions such as getnetbyname and getnetbyaddr. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0684 |
CPE : Common Platform Enumeration
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
53299 | GNU DNS Resolver Library (glibc) Multiple DNS Resolver Functions Remote Overflow |
53298 | BSD DNS Resolver Library (libc) Multiple DNS Resolver Functions Remote Overflow |
14432 | ISC BIND Multiple DNS Resolver Functions Remote Overflow |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2004-07-31 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2002-050.nasl - Type : ACT_GATHER_INFO |
2004-07-06 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2002-167.nasl - Type : ACT_GATHER_INFO |
2003-04-03 | Name : It is possible to use the remote name server to execute arbitrary code on the... File : bind_resolver_overflow.nasl - Type : ACT_GATHER_INFO |
2003-03-04 | Name : It is possible to use the remote name server to break into the remote host. File : bind9_overflow.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2021-05-04 12:01:42 |
|
2021-04-22 01:01:50 |
|
2020-12-11 01:01:09 |
|
2020-05-24 01:01:08 |
|
2020-05-23 01:35:50 |
|
2020-05-23 00:15:00 |
|
2018-05-30 12:01:17 |
|
2017-12-19 12:01:09 |
|
2016-10-18 12:01:02 |
|
2016-04-27 09:21:28 |
|
2014-02-17 10:24:47 |
|
2013-05-11 12:10:10 |
|