First published: Fri Nov 29 2002(Updated: )
BIND 8.3.x through 8.3.3 allows remote attackers to cause a denial of service (termination due to assertion failure) via a request for a subdomain that does not exist, with an OPT resource record with a large UDP payload size.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ISC BIND 9 | =8.3.1 | |
ISC BIND 9 | =8.3.2 | |
ISC BIND 9 | =8.3.0 | |
ISC BIND 9 | =8.3.3 | |
OpenBSD | =3.1 | |
FreeBSD Kernel | =4.5 | |
FreeBSD Kernel | =4.7 | |
FreeBSD Kernel | =4.4 | |
OpenBSD | =3.2 | |
OpenBSD | =3.0 | |
FreeBSD Kernel | =4.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1220 is classified as a denial of service vulnerability that can cause system termination.
To fix CVE-2002-1220, upgrade to a non-vulnerable version of BIND, specifically versions above 8.3.3.
CVE-2002-1220 affects BIND versions 8.3.0 to 8.3.3.
CVE-2002-1220 exploits the handling of OPT resource records with large UDP payload sizes.
Yes, CVE-2002-1220 can also impact specific versions of FreeBSD and OpenBSD that use the vulnerable versions of BIND.