Vulnerability Name:

CVE-2002-0400 (CCN-9250)

Assigned:2002-06-04
Published:2002-06-04
Updated:2008-09-10
Summary:ISC BIND 9 before 9.2.1 allows remote attackers to cause a denial of service (shutdown) via a malformed DNS packet that triggers an error condition that is not properly handled when the rdataset parameter to the dns_message_findtype() function in message.c is not NULL, aka DoS_findtype.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Denial of Service
References:Source: CALDERA
Type: UNKNOWN
CSSA-2002-SCO.24

Source: CCN
Type: Caldera International, Inc. Security Advisory CSSA-2002-SCO.24.1
REVISED: Open UNIX 8.0.0 : BIND 9 Denial-of-Service vulnerability

Source: CCN
Type: Caldera International, Inc. Security Advisory CSSA-2002-SCO.24
Open UNIX 8.0.0 : BIND 9 Denial-of-Service vulnerability

Source: HP
Type: UNKNOWN
HPSBUX0207-202

Source: MITRE
Type: CNA
CVE-2002-0400

Source: CONECTIVA
Type: UNKNOWN
CLA-2002:494

Source: CCN
Type: Conectiva Linux Announcement CLSA-2002:494
bind

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2002:038

Source: CCN
Type: National Infrastructure Protection Center Advisory 02-004
ISC BIND 9 DoS Vulnerability

Source: CCN
Type: RHSA-2002-105
Updated bind packages fix denial of service attack

Source: CCN
Type: RHSA-2002-119
bind security update

Source: CCN
Type: RHSA-2003-154
Updated bind packages fix buffer overflow in resolver library

Source: CCN
Type: CERT Advisory CA-2002-15
Denial-of-Service Vulnerability in ISC BIND 9

Source: CERT
Type: Patch, Third Party Advisory, US Government Resource
CA-2002-15

Source: CONFIRM
Type: UNKNOWN
http://www.isc.org/index.pl?/sw/bind/bind-security.php

Source: CCN
Type: ICS Web site
Internet Software Consortium - BIND 9.2.1

Source: XF
Type: Vendor Advisory
bind-findtype-dos(9250)

Source: CCN
Type: Internet Security Systems Security Alert #119
Remote Denial of Service Vulnerability in ISC BIND

Source: CCN
Type: US-CERT VU#739123
ISC BIND 9 fails to process additional data chains in responses correctly thereby causing the server to fail an internal consistency check

Source: CERT-VN
Type: Patch, Third Party Advisory, US Government Resource
VU#739123

Source: SUSE
Type: UNKNOWN
SuSE-SA:2002:021

Source: REDHAT
Type: UNKNOWN
RHSA-2002:105

Source: REDHAT
Type: UNKNOWN
RHSA-2002:119

Source: REDHAT
Type: UNKNOWN
RHSA-2003:154

Source: BID
Type: UNKNOWN
4936

Source: CCN
Type: BID-4936
ISC BIND 9 Remote Denial Of Service Vulnerability

Source: XF
Type: UNKNOWN
bind-findtype-dos(9250)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:isc:bind:9.0:*:*:*:-:*:*:*
  • OR cpe:/a:isc:bind:9.1:*:*:*:-:*:*:*
  • OR cpe:/a:isc:bind:9.1.1:*:*:*:-:*:*:*
  • OR cpe:/a:isc:bind:9.1.2:*:*:*:-:*:*:*
  • OR cpe:/a:isc:bind:9.1.3:*:*:*:-:*:*:*
  • OR cpe:/a:isc:bind:9.2:*:*:*:-:*:*:*

  • Configuration CCN 1:
  • cpe:/a:isc:bind:9.0:*:*:*:-:*:*:*
  • OR cpe:/a:isc:bind:9.1:*:*:*:-:*:*:*
  • OR cpe:/a:isc:bind:9.1.1:*:*:*:-:*:*:*
  • OR cpe:/a:isc:bind:9.1.2:*:*:*:-:*:*:*
  • OR cpe:/a:isc:bind:9.1.3:*:*:*:-:*:*:*
  • OR cpe:/a:isc:bind:9.2:*:*:*:-:*:*:*
  • AND
  • cpe:/o:suse:suse_linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.2:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.3:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:pseries:*
  • OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:iseries:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.0:*:ppc:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.1:*:ia64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.2:*:ppc:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    isc bind 9.0
    isc bind 9.1
    isc bind 9.1.1
    isc bind 9.1.2
    isc bind 9.1.3
    isc bind 9.2
    isc bind 9.0
    isc bind 9.1
    isc bind 9.1.1
    isc bind 9.1.2
    isc bind 9.1.3
    isc bind 9.2
    suse suse linux *
    redhat linux 7
    conectiva linux 6.0
    redhat linux 7.1
    mandrakesoft mandrake linux 8.0
    conectiva linux 7.0
    mandrakesoft mandrake linux 8.1
    redhat linux 7.2
    mandrakesoft mandrake linux 8.2
    conectiva linux 8.0
    redhat linux 7.3
    redhat enterprise linux 2.1
    redhat linux 7.1
    redhat linux 7.1
    mandrakesoft mandrake linux 8.0
    mandrakesoft mandrake linux 8.1
    mandrakesoft mandrake linux 8.2