Buffer overflows in netstd 3.07-17 package allows remote DNS servers to execute arbitrary code via a long FQDN reply, as observed in the utilities (1) linux-ftpd, (2) pcnfsd, (3) tftp, (4) traceroute, or (5) from/to.
References
Link | Resource |
---|---|
http://online.securityfocus.com/archive/1/273987 | |
http://online.securityfocus.com/archive/1/274143 | |
http://www.iss.net/security_center/static/9164.php | Patch Vendor Advisory |
http://www.securityfocus.com/bid/4816 | Patch Vendor Advisory |
http://online.securityfocus.com/archive/1/273987 | |
http://online.securityfocus.com/archive/1/274143 | |
http://www.iss.net/security_center/static/9164.php | Patch Vendor Advisory |
http://www.securityfocus.com/bid/4816 | Patch Vendor Advisory |
Configurations
History
20 Nov 2024, 23:40
Type | Values Removed | Values Added |
---|---|---|
References | () http://online.securityfocus.com/archive/1/273987 - | |
References | () http://online.securityfocus.com/archive/1/274143 - | |
References | () http://www.iss.net/security_center/static/9164.php - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/4816 - Patch, Vendor Advisory |
Information
Published : 2002-10-04 04:00
Updated : 2024-11-20 23:40
NVD link : CVE-2002-0910
Mitre link : CVE-2002-0910
CVE.ORG link : CVE-2002-0910
JSON object : View
Products Affected
debian
- netstd
CWE