Buffer overflow in the code for recursion and glue fetching in BIND 8.4.4 and 8.4.5 allows remote attackers to cause a denial of service (crash) via queries that trigger the overflow in the q_usedns array that tracks nameservers and addresses.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:54
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.1/SCOSA-2006.1.txt - | |
References | () http://secunia.com/advisories/14009 - | |
References | () http://secunia.com/advisories/18291 - | |
References | () http://securitytracker.com/id?1012996 - | |
References | () http://www.isc.org/index.pl?/sw/bind/bind-security.php - Patch | |
References | () http://www.isc.org/index.pl?/sw/bind/bind8.php - Patch | |
References | () http://www.kb.cert.org/vuls/id/327633 - Third Party Advisory, US Government Resource | |
References | () http://www.securityfocus.com/bid/12364 - | |
References | () http://www.uniras.gov.uk/niscc/docs/al-20050125-00059.html - Patch | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/19063 - |
Information
Published : 2005-05-02 04:00
Updated : 2024-11-20 23:54
NVD link : CVE-2005-0033
Mitre link : CVE-2005-0033
CVE.ORG link : CVE-2005-0033
JSON object : View
Products Affected
isc
- bind
CWE