Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU110134
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2002-0684
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Buffer overflow in DNS resolver functions that perform lookup of network names and addresses, as used in BIND 4.9.8 and ported to glibc 2.2.5 and earlier, allows remote malicious DNS servers to execute arbitrary code through a subroutine used by functions such as getnetbyname and getnetbyaddr.
MitigationInstall update from vendor's website.
Vulnerable software versionsGlibc: 0.1 - 2.2.5
CPE2.3https://distro.conectiva.com/atualizacoes/?id=a&anuncio=000507
https://marc.info/?l=bugtraq&m=102581482511612&w=2
https://rhn.redhat.com/errata/RHSA-2002-139.html
https://www.kb.cert.org/vuls/id/542971
https://www.linux-mandrake.com/en/security/2002/MDKSA-2002-050.php
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.