- EPSS 9.72%
- Veröffentlicht 11.10.2002 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
The BIND 4 and BIND 8.2.x stub resolver libraries, and other libraries such as glibc 2.2.5 and earlier, libc, and libresolv, use the maximum buffer size instead of the actual size when processing a DNS response, which causes the stub resolvers to rea...
CVE-2002-0684
- EPSS 3.54%
- Veröffentlicht 12.08.2002 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Buffer overflow in DNS resolver functions that perform lookup of network names and addresses, as used in BIND 4.9.8 and ported to glibc 2.2.5 and earlier, allows remote malicious DNS servers to execute arbitrary code through a subroutine used by func...
CVE-2000-0959
- EPSS 0.09%
- Veröffentlicht 19.12.2000 05:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
glibc2 does not properly clear the LD_DEBUG_OUTPUT and LD_DEBUG environmental variables when a program is spawned from a setuid program, which could allow local users to overwrite files via a symlink attack.
CVE-2000-0824
- EPSS 0.31%
- Veröffentlicht 14.11.2000 05:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
The unsetenv function in glibc 2.1.1 does not properly unset an environmental variable if the variable is provided twice to a program, which could allow local users to execute arbitrary commands in setuid programs by specifying their own duplicate en...
CVE-2000-0335
- EPSS 1.13%
- Veröffentlicht 03.05.2000 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
The resolver in glibc 2.1.3 uses predictable IDs, which allows a local attacker to spoof DNS query results.