First published: Sat Aug 31 2002(Updated: )
Buffer overflows in netstd 3.07-17 package allows remote DNS servers to execute arbitrary code via a long FQDN reply, as observed in the utilities (1) linux-ftpd, (2) pcnfsd, (3) tftp, (4) traceroute, or (5) from/to.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian Netstd | =3.07 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0910 has a high severity rating due to the potential for arbitrary code execution by remote attackers.
CVE-2002-0910 specifically affects the netstd package version 3.07-17 on Debian systems.
To fix CVE-2002-0910, you should upgrade the netstd package to a version that has addressed this vulnerability.
CVE-2002-0910 involves a buffer overflow attack that can be triggered by long Fully Qualified Domain Name (FQDN) replies.
Yes, CVE-2002-0910 can be exploited remotely by sending specially crafted DNS replies to vulnerable systems.