First published: Mon Feb 12 2001(Updated: )
Buffer overflow in transaction signature (TSIG) handling code in BIND 8 allows remote attackers to gain root privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ISC BIND 9 | =8.2.2-p7 | |
ISC BIND 9 | =8.2 | |
ISC BIND 9 | =8.2.1 | |
ISC BIND 9 | =8.2.2-p1 | |
ISC BIND 9 | =8.2.2-p4 | |
ISC BIND 9 | =8.2.2-p2 | |
ISC BIND 9 | =8.2.2 | |
ISC BIND 9 | =8.2.2-p6 | |
ISC BIND 9 | =8.2.2-p5 | |
ISC BIND 9 | =8.2.2-p3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0010 is categorized as a critical severity vulnerability due to the potential for remote root privilege escalation.
To fix CVE-2001-0010, upgrade to a patched version of BIND 8, specifically a version later than 8.2.2-p7.
CVE-2001-0010 allows remote attackers to exploit a buffer overflow, leading to unauthorized root access.
CVE-2001-0010 affects BIND 8, specifically versions including 8.2, 8.2.1, and several patches of 8.2.2.
Yes, CVE-2001-0010 can be exploited remotely, making it particularly dangerous for servers running vulnerable versions of BIND 8.