First published: Wed Jul 03 2002(Updated: )
Buffer overflow in the DNS resolver code used in libc, glibc, and libbind, as derived from ISC BIND, allows remote malicious DNS servers to cause a denial of service and possibly execute arbitrary code via the stub resolvers.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
BIND 9 | =9.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0651 has a high severity rating due to its potential to allow remote code execution or denial of service.
The recommended fix for CVE-2002-0651 is to upgrade to a patched version of ISC BIND, specifically versions later than 9.4.0.
CVE-2002-0651 is caused by a buffer overflow in the DNS resolver code utilized by libc, glibc, and libbind.
The potential impacts of CVE-2002-0651 include service disruption through denial of service or the execution of arbitrary code.
Organizations using ISC BIND version 9.4.0 or earlier are primarily affected by CVE-2002-0651.