CVE-2002-0684

Scores

EPSS

0.036very_low3.6%
0%20%40%60%80%100%

Percentile: 3.6%

CVSS

7.5high2.0
0246810

CVSS Score: 7.5/10

All CVSS Scores

CVSS 2.0
7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Description

Buffer overflow in DNS resolver functions that perform lookup of network names and addresses, as used in BIND 4.9.8 and ported to glibc 2.2.5 and earlier, allows remote malicious DNS servers to execute arbitrary code through a subroutine used by functions such as getnetbyname and getnetbyaddr.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvd

Exploits

Exploit ID: 21018

Source: exploitdb

URL: https://www.exploit-db.com/exploits/21018

Exploit ID: 290

Source: exploitdb

URL: https://www.exploit-db.com/exploits/290

Vulnerable Software (3)

Type: Configuration

Product: glibc

Operating System: debian

Trait:
{  "fixed": "2.2.5-8"}

Source: debian

Type: Configuration

Vendor: *

Product: bind

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*",      "versionEndIncluding": "2.2.5",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:isc:bind:4.9....

Source: nvd

Type: Configuration

Vendor: *

Product: glibc

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*",      "versionEndIncluding": "2.2.5",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:isc:bind:4.9....

Source: nvd

End of list