Vulnerability Name:

CVE-2002-0651 (CCN-9432)

Assigned:2002-06-27
Published:2002-06-27
Updated:2017-10-10
Summary:Buffer overflow in the DNS resolver code used in libc, glibc, and libbind, as derived from ISC BIND, allows remote malicious DNS servers to cause a denial of service and possibly execute arbitrary code via the stub resolvers.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: CALDERA
Type: UNKNOWN
CSSA-2002-SCO.39

Source: CCN
Type: Caldera International, Inc. Security Advisory CSSA-2002-SCO.39
OpenServer 5.0.5 OpenServer 5.0.6 : Buffer Overflow in Multiple DNS Resolver Libraries

Source: CALDERA
Type: UNKNOWN
CSSA-2002-SCO.37

Source: CCN
Type: Caldera International, Inc. Security Advisory CSSA-2002-SCO.37
UnixWare 7.1.1 : buffer overflow in DNS resolver

Source: NETBSD
Type: UNKNOWN
NetBSD-SA2002-006

Source: CCN
Type: SGI Security Advisory 20020701-01-I
DNS resolver vulnerability

Source: SGI
Type: UNKNOWN
20020701-01-I

Source: AIXAPAR
Type: UNKNOWN
IY32746

Source: CCN
Type: FreeBSD Security Advisory FreeBSD-SA-02:28.resolv
buffer overflow in resolver

Source: CCN
Type: Full-Disclosure Mailing List, Mon Sep 16 2002 - 20:52:16 CDT
buffer overrun in libc/libresolv DNS resolver

Source: CCN
Type: Full-Disclosure Mailing List, Nov 19 2002 - 11:22:03 CST
Buffer overrun in getnetbyname/getnetbyaddr

Source: ENGARDE
Type: UNKNOWN
ESA-20020724-018

Source: NTBUGTRAQ
Type: UNKNOWN
20020703 Buffer overflow and DoS i BIND

Source: CCN
Type: Compaq SECURITY BULLETIN SRB0039W
HP Tru64 UNIX - Potential Buffer Overflows & SSRT2229 Potential Denial of Service

Source: MITRE
Type: CNA
CVE-2002-0651

Source: MITRE
Type: CNA
CVE-2002-0684

Source: CCN
Type: Conectiva Linux Announcement CLSA-2002:507
Resolver libraries vulnerabilities

Source: CONECTIVA
Type: UNKNOWN
CLSA-2002:507

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2002:038

Source: BUGTRAQ
Type: UNKNOWN
20020626 Remote buffer overflow in resolver code of libc

Source: FREEBSD
Type: UNKNOWN
FreeBSD-SA-02:28

Source: BUGTRAQ
Type: UNKNOWN
20020704 [OpenPKG-SA-2002.006] OpenPKG Security Advisory (bind)

Source: CCN
Type: RHSA-2002-119
bind security update

Source: CCN
Type: RHSA-2002-133
Updated bind packages fix buffer overflow in resolver library

Source: CCN
Type: RHSA-2002-139
Updated glibc packages fix vulnerabilities in resolver

Source: REDHAT
Type: UNKNOWN
RHSA-2002:139

Source: CCN
Type: RHSA-2002-167
glibc security update

Source: CCN
Type: RHSA-2003-154
Updated bind packages fix buffer overflow in resolver library

Source: CCN
Type: RHSA-2003-212
Updated glibc packages fix vulnerabilities

Source: CCN
Type: Sun Alert ID: 46042
Buffer Overflow in DNS Resolver Library (CA-2002-19)

Source: CCN
Type: CERT Advisory CA-2002-19
Buffer Overflow in Multiple DNS Resolver Libraries

Source: CERT
Type: Patch, Third Party Advisory, US Government Resource
CA-2002-19

Source: CCN
Type: CIAC Information Bulletin M-110
Buffer Overflow in Multiple Domain Name System (DNS) Libraries

Source: CCN
Type: Internet Software Consortium Web site
BIND

Source: XF
Type: Vendor Advisory
dns-resolver-lib-bo(9432)

Source: CCN
Type: US-CERT VU#542971
Multiple vendors` Domain Name System (DNS) stub resolvers vulnerable to buffer overflow via network name and address lookups

Source: CCN
Type: US-CERT VU#803539
Multiple vendors` Domain Name System (DNS) stub resolvers vulnerable to buffer overflows

Source: CERT-VN
Type: US Government Resource
VU#803539

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2002:043

Source: CCN
Type: Trustix Secure Linux Security Advisory #2002-0067
glibc

Source: CCN
Type: EnGarde Secure Linux Security Advisory ESA-20021003-021
several security-related updates.

Source: CCN
Type: OpenBSD 3.1 errata
007: SECURITY FIX: June 25, 2002

Source: CCN
Type: OpenBSD 2.9 errata
027: SECURITY FIX: June 25, 2002

Source: CCN
Type: OpenBSD 3.0 errata
025: SECURITY FIX: June 25, 2002

Source: CCN
Type: OpenPKG-SA-2002.006
BIND

Source: CCN
Type: Pine Internet Security Advisory PINE-CERT-20020601
Remote buffer overflow in resolver code of libc

Source: MISC
Type: UNKNOWN
http://www.pine.nl/advisories/pine-cert-20020601.txt

Source: REDHAT
Type: UNKNOWN
RHSA-2002:119

Source: REDHAT
Type: UNKNOWN
RHSA-2002:133

Source: REDHAT
Type: UNKNOWN
RHSA-2002:167

Source: REDHAT
Type: UNKNOWN
RHSA-2003:154

Source: BID
Type: UNKNOWN
5100

Source: CCN
Type: BID-5100
Multiple Vendor libc DNS Resolver Buffer Overflow Vulnerability

Source: CCN
Type: Trustix Secure Linux Security Advisory #2002-0061
bind

Source: XF
Type: UNKNOWN
dns-resolver-lib-bo(9432)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:4190

Vulnerable Configuration:Configuration 1:
  • cpe:/a:isc:bind:9.4.0:*:*:*:-:*:*:*

  • Configuration CCN 1:
  • cpe:/o:hp:hp-ux:10.20:*:*:*:*:*:*:*
  • OR cpe:/a:isc:bind:8.2:-:*:*:*:*:*:*
  • OR cpe:/a:isc:bind:8.2:p1:*:*:-:*:*:*
  • OR cpe:/a:isc:bind:8.2.1:*:*:*:-:*:*:*
  • OR cpe:/a:isc:bind:4.9.5:*:*:*:-:*:*:*
  • OR cpe:/a:isc:bind:4.9.5:p1:*:*:-:*:*:*
  • OR cpe:/a:isc:bind:4.9.6:*:*:*:-:*:*:*
  • OR cpe:/a:isc:bind:4.9.7:*:*:*:-:*:*:*
  • OR cpe:/a:isc:bind:8.1:*:*:*:-:*:*:*
  • OR cpe:/a:isc:bind:8.1.1:*:*:*:-:*:*:*
  • OR cpe:/a:isc:bind:8.1.2:*:*:*:-:*:*:*
  • OR cpe:/a:isc:bind:8.2.2:-:*:*:*:*:*:*
  • OR cpe:/a:isc:bind:8.2.2:p1:*:*:-:*:*:*
  • OR cpe:/a:isc:bind:8.3.2:*:*:*:-:*:*:*
  • OR cpe:/a:isc:bind:8.3.1:*:*:*:-:*:*:*
  • OR cpe:/a:isc:bind:8.3.0:*:*:*:-:*:*:*
  • OR cpe:/a:isc:bind:8.2.6:*:*:*:-:*:*:*
  • OR cpe:/a:isc:bind:8.2.5:*:*:*:-:*:*:*
  • OR cpe:/a:isc:bind:8.2.4:*:*:*:-:*:*:*
  • OR cpe:/a:isc:bind:8.2.3:*:*:*:-:*:*:*
  • OR cpe:/a:isc:bind:8.2.2:p7:*:*:-:*:*:*
  • OR cpe:/a:isc:bind:8.2.2:p5:*:*:-:*:*:*
  • OR cpe:/a:isc:bind:8.2.2:p3:*:*:-:*:*:*
  • OR cpe:/a:isc:bind:4.9.2:*:*:*:-:*:*:*
  • OR cpe:/a:isc:bind:4.9.3:*:*:*:-:*:*:*
  • OR cpe:/a:isc:bind:4.9.4:*:*:*:-:*:*:*
  • OR cpe:/a:isc:bind:4.9.8:*:*:*:-:*:*:*
  • OR cpe:/a:isc:bind:4.9.9:*:*:*:-:*:*:*
  • OR cpe:/a:isc:bind:4.9.10:*:*:*:-:*:*:*
  • OR cpe:/a:isc:bind:8.2.2:p6:*:*:-:*:*:*
  • OR cpe:/a:isc:bind:8.2.2:p4:*:*:-:*:*:*
  • OR cpe:/a:isc:bind:8.2.2:p2:*:*:-:*:*:*
  • OR cpe:/a:isc:bind:4.9:*:*:*:-:*:*:*
  • OR cpe:/a:isc:bind:4:*:*:*:-:*:*:*
  • OR cpe:/a:isc:bind:8:*:*:*:-:*:*:*
  • OR cpe:/a:isc:bind:8.2.3:t1a:*:*:-:*:*:*
  • OR cpe:/a:isc:bind:8.2.3:t9b:*:*:-:*:*:*
  • AND
  • cpe:/o:sun:sunos:5.5.1:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:5.6:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:10.10:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.00:*:*:*:*:*:*:*
  • OR cpe:/o:compaq:tru64:4.0f:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.4.1:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:5.8:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:6.2:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.04:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.4.2:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:1.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.4:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.11:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.5:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:10.24:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:compaq:tru64:4.0g:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:1.2:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:openbsd:openbsd:2.9:*:*:*:*:*:*:*
  • OR cpe:/a:mandrakesoft:mandrake_single_network_firewall:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.3:-:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:1.5:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.4.3:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*
  • OR cpe:/o:compaq:tru64:5.0a:*:*:*:*:*:*:*
  • OR cpe:/o:compaq:tru64:5.1:*:*:*:*:*:*:*
  • OR cpe:/o:compaq:tru64:5.1a:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:7.3:*:*:*:*:*:*:*
  • OR cpe:/o:openbsd:openbsd:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.4:-:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*
  • OR cpe:/o:engardelinux:secure_linux:-:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_linux_firewall:*:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_linux_database_server:*:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_email_server:iii:*:*:*:*:*:*:*
  • OR cpe:/a:openpkg:openpkg:1.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:openbsd:openbsd:3.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.3:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.5:-:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:5.9:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.6:-:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.6:beta:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.22:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:current:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
  • OR cpe:/o:sun:sunos:5.7:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:pseries:*
  • OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:iseries:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.0:*:ppc:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.1:*:ia64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.2:*:ppc:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:4190
    V
    Buffer Overflow in DNS Resolver Library
    2005-03-09
    BACK
    isc bind 9.4.0
    hp hp-ux 10.20
    isc bind 8.2
    isc bind 8.2 p1
    isc bind 8.2.1
    isc bind 4.9.5
    isc bind 4.9.5 p1
    isc bind 4.9.6
    isc bind 4.9.7
    isc bind 8.1
    isc bind 8.1.1
    isc bind 8.1.2
    isc bind 8.2.2
    isc bind 8.2.2 p1
    isc bind 8.3.2
    isc bind 8.3.1
    isc bind 8.3.0
    isc bind 8.2.6
    isc bind 8.2.5
    isc bind 8.2.4
    isc bind 8.2.3
    isc bind 8.2.2 p7
    isc bind 8.2.2 p5
    isc bind 8.2.2 p3
    isc bind 4.9.2
    isc bind 4.9.3
    isc bind 4.9.4
    isc bind 4.9.8
    isc bind 4.9.9
    isc bind 4.9.10
    isc bind 8.2.2 p6
    isc bind 8.2.2 p4
    isc bind 8.2.2 p2
    isc bind 4.9
    isc bind 4
    isc bind 8
    isc bind 8.2.3 t1a
    isc bind 8.2.3 t9b
    sun solaris 2.5.1
    sun solaris 2.6
    hp hp-ux 10.10
    hp hp-ux 11.00
    compaq tru64 4.0f
    netbsd netbsd 1.4.1
    sun solaris 8
    redhat linux 6.2
    freebsd freebsd 4.0
    hp hp-ux 11.04
    netbsd netbsd 1.4.2
    mandrakesoft mandrake linux 7.1
    trustix secure linux 1.1
    redhat linux 7
    netbsd netbsd 1.4
    hp hp-ux 11.11
    freebsd freebsd 4.1
    mandrakesoft mandrake linux 7.2
    netbsd netbsd 1.5
    hp hp-ux 10.24
    suse suse linux 7.0
    compaq tru64 4.0g
    conectiva linux 6.0
    mandrakesoft mandrake linux corporate server 1.0.1
    freebsd freebsd 4.2
    suse suse linux 7.1
    redhat linux 7.1
    trustix secure linux 1.2
    mandrakesoft mandrake linux 8.0
    openbsd openbsd 2.9
    mandrakesoft mandrake single network firewall 7.2
    suse suse linux 7.2
    freebsd freebsd 4.3 -
    conectiva linux 7.0
    trustix secure linux 1.5
    netbsd netbsd 1.4.3
    netbsd netbsd 1.5.1
    compaq tru64 5.0a
    compaq tru64 5.1
    compaq tru64 5.1a
    mandrakesoft mandrake linux 8.1
    redhat linux 7.2
    suse suse linux 7.3
    openbsd openbsd 3.0
    freebsd freebsd 4.4 -
    netbsd netbsd 1.5.2
    engardelinux secure linux -
    suse suse linux firewall *
    suse suse linux database server *
    suse suse email server iii
    openpkg openpkg 1.0
    mandrakesoft mandrake linux 8.2
    suse suse linux 8.0
    conectiva linux 8.0
    openbsd openbsd 3.1
    redhat linux 7.3
    freebsd freebsd 4.5 -
    sun solaris 9
    freebsd freebsd 4.6 -
    netbsd netbsd 1.6 beta
    hp hp-ux 11.22
    netbsd netbsd current
    redhat enterprise linux 2.1
    sun solaris 7.0
    redhat linux 7.1
    redhat linux 7.1
    mandrakesoft mandrake linux 8.0
    mandrakesoft mandrake linux 8.1
    mandrakesoft mandrake linux 8.2