Risks
Vulnerabilities
Browse by
Remote Buffer Overflow in Resolver Code of libc
27 June 2002
Bookmark and Share
From: Mark Lastdrager <mark@pine.nl>

Pine Internet Security Advisory

Advisory ID : PINE-CERT-20020601
Authors : Joost Pol <joost@pine.nl>
Issue date : 2002-06-25
Application : Multiple
Version(s) : Multiple
Platforms : FreeBSD, OpenBSD, NetBSD, maybe more.
Availability : http://www.pine.nl/advisories/pine-cert-20020601.txt

Synopsis

There is a remote buffer overflow in the resolver code of libc.

Impact

Serious.

Exploitability will vary on application-specific issues.

Description

There is a slight mistake in the resolver code of libc.

This will allow an attacker-controlled DNS server to reply with a carefully crafted message to (for example) a gethostbyname request.

This reply will trigger the buffer overflow

Solution

FreeBSD, NetBSD and OpenBSD CVS have been updated.


Spotlight

Email scammers stole $215M from businesses in 14 months

Posted on 29 January 2015.  |  In 14 months there have been nearly 1200 US and a little over 900 non-US victims of BEC scams, and the total money loss reached nearly $215 million.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Fri, Jan 30th
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //