First published: Wed Nov 10 1999(Updated: )
Buffer overflow in BIND 8.2 via NXT records.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ISC BIND 9 | =8.2 | |
ISC BIND 9 | =8.2.1 | |
Oracle Solaris and Zettabyte File System (ZFS) | =7.0 | |
Sun SunOS | =5.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-0833 is classified as a high severity vulnerability due to the potential for a buffer overflow exploit.
To mitigate CVE-1999-0833, upgrade to a later version of BIND that is not affected, such as BIND 9.
BIND versions 8.2 and 8.2.1, along with certain versions of Solaris and SunOS, are affected by CVE-1999-0833.
CVE-1999-0833 is a buffer overflow vulnerability resulting from improper handling of NXT records in BIND.
CVE-1999-0833 can be exploited remotely by sending crafted DNS requests that trigger the buffer overflow.