Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2008-0122

Опубликовано: 16 янв. 2008
Источник: debian

Описание

Off-by-one error in the inet_network function in libbind in ISC BIND 9.4.2 and earlier, as used in libc in FreeBSD 6.2 through 7.0-PRERELEASE, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted input that triggers memory corruption.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
bindremovedpackage
bindno-dsasargepackage
bindno-dsaetchpackage
bind9not-affectedpackage
glibcfixed2.2-1package

Примечания

  • The fix for the BIND-based resolver in GNU libc was made in 2000.

  • libbind9 is distinct code, not related to the old libbind.

Связанные уязвимости

ubuntu
больше 17 лет назад

Off-by-one error in the inet_network function in libbind in ISC BIND 9.4.2 and earlier, as used in libc in FreeBSD 6.2 through 7.0-PRERELEASE, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted input that triggers memory corruption.

redhat
больше 17 лет назад

Off-by-one error in the inet_network function in libbind in ISC BIND 9.4.2 and earlier, as used in libc in FreeBSD 6.2 through 7.0-PRERELEASE, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted input that triggers memory corruption.

nvd
больше 17 лет назад

Off-by-one error in the inet_network function in libbind in ISC BIND 9.4.2 and earlier, as used in libc in FreeBSD 6.2 through 7.0-PRERELEASE, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted input that triggers memory corruption.

github
около 3 лет назад

Off-by-one error in the inet_network function in libbind in ISC BIND 9.4.2 and earlier, as used in libc in FreeBSD 6.2 through 7.0-PRERELEASE, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted input that triggers memory corruption.

oracle-oval
около 17 лет назад

ELSA-2008-0300: bind security, bug fix, and enhancement update (MODERATE)