Vulnerability Details : CVE-2002-1146
The BIND 4 and BIND 8.2.x stub resolver libraries, and other libraries such as glibc 2.2.5 and earlier, libc, and libresolv, use the maximum buffer size instead of the actual size when processing a DNS response, which causes the stub resolvers to read past the actual boundary ("read buffer overflow"), allowing remote attackers to cause a denial of service (crash).
Vulnerability category: OverflowDenial of service
Products affected by CVE-2002-1146
- cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2002-1146
10.26%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 95 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2002-1146
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
References for CVE-2002-1146
-
http://www.redhat.com/support/errata/RHSA-2003-212.html
Support
-
http://www.kb.cert.org/vuls/id/738331
VU#738331 - Domain Name System (DNS) resolver libraries vulnerable to read buffer overflowThird Party Advisory;US Government Resource
-
http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:009
-
http://www.redhat.com/support/errata/RHSA-2002-197.html
Support
-
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-015.txt.asc
-
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000535
CONECTIVA | AnĂ¡lises dos Melhores Produtos Online (#10 Melhores)
-
http://www.redhat.com/support/errata/RHSA-2002-258.html
Support
-
http://www.iss.net/security_center/static/10295.php
Vendor Advisory
-
http://www.redhat.com/support/errata/RHSA-2003-022.html
Support
Jump to