Vulnerability Name: | CCN-10559 | ||||||
Published: | 2002-10-01 | ||||||
Updated: | 2002-10-01 | ||||||
Summary: | The glibc package in some Linux distributions could allow a remote attacker to obtain sensitive information, caused by improper bounds checking of DNS (Domain Name System) response messages. By sending a malformed DNS response to a vulnerable server, a remote attacker could cause the server to possibly leak sensitive information, which could then be used by the attacker to launch further attacks against the affected server. | ||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
| ||||||
CVSS v2 Severity: | 5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
| ||||||
Vulnerability Consequences: | Obtain Information | ||||||
References: | Source: CCN Type: Conectiva Linux Announcement CLSA-2002:535 Fix for several vulnerabilities and daylight saving time for Brazil Source: CCN Type: Openwall Web site "Owl", -- a security-enhanced server platform Source: CCN Type: BID-6116 Multiple Vendor libc DNS Resolver Information Leakage Vulnerability Source: XF Type: UNKNOWN glibc-dns-information-leak(10559) | ||||||
Vulnerable Configuration: | Configuration CCN 1:![]() | ||||||
BACK |