Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2006-0527

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-02 Feb, 2006 | 11:00
Updated At-07 Aug, 2024 | 16:41
Rejected At-
Credits

BIND 4 (BIND4) and BIND 8 (BIND8), if used as a target forwarder, allows remote attackers to gain privileged access via a "Kashpureff-style DNS cache corruption" attack.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:02 Feb, 2006 | 11:00
Updated At:07 Aug, 2024 | 16:41
Rejected At:
▼CVE Numbering Authority (CNA)

BIND 4 (BIND4) and BIND 8 (BIND8), if used as a target forwarder, allows remote attackers to gain privileged access via a "Kashpureff-style DNS cache corruption" attack.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://computerworld.com/networkingtopics/networking/story/0%2C10801%2C103744%2C00.html
x_refsource_MISC
http://www.osvdb.org/22888
vdb-entry
x_refsource_OSVDB
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00595837
vendor-advisory
x_refsource_HP
http://www.vupen.com/english/advisories/2006/0399
vdb-entry
x_refsource_VUPEN
http://securitytracker.com/id?1015606
vdb-entry
x_refsource_SECTRACK
http://www.securityfocus.com/archive/1/425083/100/0/threaded
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/18690
third-party-advisory
x_refsource_SECUNIA
http://securityreason.com/securityalert/438
third-party-advisory
x_refsource_SREASON
http://www.securityfocus.com/archive/1/425083/100/0/threaded
vendor-advisory
x_refsource_HP
http://securityreason.com/securityalert/748
third-party-advisory
x_refsource_SREASON
http://securitytracker.com/id?1015551
vdb-entry
x_refsource_SECTRACK
http://www.securityfocus.com/bid/16455
vdb-entry
x_refsource_BID
http://attrition.org/pipermail/vim/2006-February/000551.html
mailing-list
x_refsource_VIM
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00595837
vendor-advisory
x_refsource_HP
https://exchange.xforce.ibmcloud.com/vulnerabilities/24414
vdb-entry
x_refsource_XF
Hyperlink: http://computerworld.com/networkingtopics/networking/story/0%2C10801%2C103744%2C00.html
Resource:
x_refsource_MISC
Hyperlink: http://www.osvdb.org/22888
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00595837
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.vupen.com/english/advisories/2006/0399
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://securitytracker.com/id?1015606
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.securityfocus.com/archive/1/425083/100/0/threaded
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/18690
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://securityreason.com/securityalert/438
Resource:
third-party-advisory
x_refsource_SREASON
Hyperlink: http://www.securityfocus.com/archive/1/425083/100/0/threaded
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://securityreason.com/securityalert/748
Resource:
third-party-advisory
x_refsource_SREASON
Hyperlink: http://securitytracker.com/id?1015551
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.securityfocus.com/bid/16455
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://attrition.org/pipermail/vim/2006-February/000551.html
Resource:
mailing-list
x_refsource_VIM
Hyperlink: http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00595837
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/24414
Resource:
vdb-entry
x_refsource_XF
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://computerworld.com/networkingtopics/networking/story/0%2C10801%2C103744%2C00.html
x_refsource_MISC
x_transferred
http://www.osvdb.org/22888
vdb-entry
x_refsource_OSVDB
x_transferred
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00595837
vendor-advisory
x_refsource_HP
x_transferred
http://www.vupen.com/english/advisories/2006/0399
vdb-entry
x_refsource_VUPEN
x_transferred
http://securitytracker.com/id?1015606
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.securityfocus.com/archive/1/425083/100/0/threaded
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/18690
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://securityreason.com/securityalert/438
third-party-advisory
x_refsource_SREASON
x_transferred
http://www.securityfocus.com/archive/1/425083/100/0/threaded
vendor-advisory
x_refsource_HP
x_transferred
http://securityreason.com/securityalert/748
third-party-advisory
x_refsource_SREASON
x_transferred
http://securitytracker.com/id?1015551
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.securityfocus.com/bid/16455
vdb-entry
x_refsource_BID
x_transferred
http://attrition.org/pipermail/vim/2006-February/000551.html
mailing-list
x_refsource_VIM
x_transferred
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00595837
vendor-advisory
x_refsource_HP
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/24414
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://computerworld.com/networkingtopics/networking/story/0%2C10801%2C103744%2C00.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.osvdb.org/22888
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00595837
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/0399
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://securitytracker.com/id?1015606
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/425083/100/0/threaded
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/18690
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://securityreason.com/securityalert/438
Resource:
third-party-advisory
x_refsource_SREASON
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/425083/100/0/threaded
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://securityreason.com/securityalert/748
Resource:
third-party-advisory
x_refsource_SREASON
x_transferred
Hyperlink: http://securitytracker.com/id?1015551
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.securityfocus.com/bid/16455
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://attrition.org/pipermail/vim/2006-February/000551.html
Resource:
mailing-list
x_refsource_VIM
x_transferred
Hyperlink: http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00595837
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/24414
Resource:
vdb-entry
x_refsource_XF
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:02 Feb, 2006 | 11:02
Updated At:03 Apr, 2025 | 01:03

BIND 4 (BIND4) and BIND 8 (BIND8), if used as a target forwarder, allows remote attackers to gain privileged access via a "Kashpureff-style DNS cache corruption" attack.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.07.5HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
Type: Primary
Version: 2.0
Base score: 7.5
Base severity: HIGH
Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CPE Matches

Internet Systems Consortium, Inc.
isc
>>bind>>4
cpe:2.3:a:isc:bind:4:*:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>8
cpe:2.3:a:isc:bind:8:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-264Primarynvd@nist.gov
CWE ID: CWE-264
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://attrition.org/pipermail/vim/2006-February/000551.htmlcve@mitre.org
N/A
http://computerworld.com/networkingtopics/networking/story/0%2C10801%2C103744%2C00.htmlcve@mitre.org
N/A
http://secunia.com/advisories/18690cve@mitre.org
Patch
Vendor Advisory
http://securityreason.com/securityalert/438cve@mitre.org
N/A
http://securityreason.com/securityalert/748cve@mitre.org
N/A
http://securitytracker.com/id?1015551cve@mitre.org
Patch
http://securitytracker.com/id?1015606cve@mitre.org
Patch
http://www.osvdb.org/22888cve@mitre.org
N/A
http://www.securityfocus.com/archive/1/425083/100/0/threadedcve@mitre.org
N/A
http://www.securityfocus.com/archive/1/425083/100/0/threadedcve@mitre.org
N/A
http://www.securityfocus.com/bid/16455cve@mitre.org
N/A
http://www.vupen.com/english/advisories/2006/0399cve@mitre.org
Vendor Advisory
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00595837cve@mitre.org
N/A
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00595837cve@mitre.org
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/24414cve@mitre.org
N/A
http://attrition.org/pipermail/vim/2006-February/000551.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://computerworld.com/networkingtopics/networking/story/0%2C10801%2C103744%2C00.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/18690af854a3a-2127-422b-91ae-364da2661108
Patch
Vendor Advisory
http://securityreason.com/securityalert/438af854a3a-2127-422b-91ae-364da2661108
N/A
http://securityreason.com/securityalert/748af854a3a-2127-422b-91ae-364da2661108
N/A
http://securitytracker.com/id?1015551af854a3a-2127-422b-91ae-364da2661108
Patch
http://securitytracker.com/id?1015606af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.osvdb.org/22888af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/archive/1/425083/100/0/threadedaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/archive/1/425083/100/0/threadedaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/bid/16455af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2006/0399af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00595837af854a3a-2127-422b-91ae-364da2661108
N/A
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00595837af854a3a-2127-422b-91ae-364da2661108
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/24414af854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: http://attrition.org/pipermail/vim/2006-February/000551.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://computerworld.com/networkingtopics/networking/story/0%2C10801%2C103744%2C00.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/18690
Source: cve@mitre.org
Resource:
Patch
Vendor Advisory
Hyperlink: http://securityreason.com/securityalert/438
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://securityreason.com/securityalert/748
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://securitytracker.com/id?1015551
Source: cve@mitre.org
Resource:
Patch
Hyperlink: http://securitytracker.com/id?1015606
Source: cve@mitre.org
Resource:
Patch
Hyperlink: http://www.osvdb.org/22888
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/425083/100/0/threaded
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/425083/100/0/threaded
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/16455
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/0399
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00595837
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00595837
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/24414
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://attrition.org/pipermail/vim/2006-February/000551.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://computerworld.com/networkingtopics/networking/story/0%2C10801%2C103744%2C00.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/18690
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Vendor Advisory
Hyperlink: http://securityreason.com/securityalert/438
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://securityreason.com/securityalert/748
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://securitytracker.com/id?1015551
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: http://securitytracker.com/id?1015606
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: http://www.osvdb.org/22888
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/425083/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/425083/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/16455
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2006/0399
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00595837
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00595837
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/24414
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

13Records found

CVE-2011-0997
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-71.98% / 98.68%
||
7 Day CHG~0.00%
Published-08 Apr, 2011 | 15:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message, as demonstrated by a hostname that is provided to dhclient-script.

Action-Not Available
Vendor-n/aCanonical Ltd.Internet Systems Consortium, Inc.Debian GNU/Linux
Product-ubuntu_linuxdhcpdebian_linuxn/a
CWE ID-CWE-20
Improper Input Validation
CVE-1999-0706
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.86% / 74.15%
||
7 Day CHG~0.00%
Published-04 Jan, 2000 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Linux xmonisdn package allows local users to gain root privileges by modifying the IFS or PATH environmental variables.

Action-Not Available
Vendor-n/aRed Hat, Inc.Internet Systems Consortium, Inc.
Product-innlinuxn/a
CVE-2000-0335
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-1.13% / 77.45%
||
7 Day CHG~0.00%
Published-13 Oct, 2000 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The resolver in glibc 2.1.3 uses predictable IDs, which allows a local attacker to spoof DNS query results.

Action-Not Available
Vendor-n/aGNUInternet Systems Consortium, Inc.
Product-glibcbindn/a
CVE-2004-0045
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-35.33% / 96.92%
||
7 Day CHG~0.00%
Published-01 Sep, 2004 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in the ARTpost function in art.c in the control message handling code for INN 2.4.0 may allow remote attackers to execute arbitrary code.

Action-Not Available
Vendor-n/aInternet Systems Consortium, Inc.
Product-innn/a
CVE-2003-0026
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-12.42% / 93.64%
||
7 Day CHG~0.00%
Published-16 Jan, 2003 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple stack-based buffer overflows in the error handling routines of the minires library, as used in the NSUPDATE capability for ISC DHCPD 3.0 through 3.0.1RC10, allow remote attackers to execute arbitrary code via a DHCP message containing a long hostname.

Action-Not Available
Vendor-n/aInternet Systems Consortium, Inc.
Product-dhcpdn/a
CVE-2002-1219
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-7.08% / 91.15%
||
7 Day CHG~0.00%
Published-01 Sep, 2004 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in named in BIND 4 versions 4.9.10 and earlier, and 8 versions 8.3.3 and earlier, allows remote attackers to execute arbitrary code via a certain DNS server response containing SIG resource records (RR).

Action-Not Available
Vendor-n/aOpenBSDFreeBSD FoundationInternet Systems Consortium, Inc.
Product-bindopenbsdfreebsdn/a
CVE-2002-0684
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-3.54% / 87.20%
||
7 Day CHG~0.00%
Published-31 Jul, 2002 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in DNS resolver functions that perform lookup of network names and addresses, as used in BIND 4.9.8 and ported to glibc 2.2.5 and earlier, allows remote malicious DNS servers to execute arbitrary code through a subroutine used by functions such as getnetbyname and getnetbyaddr.

Action-Not Available
Vendor-n/aGNUInternet Systems Consortium, Inc.
Product-glibcbindn/a
CVE-2002-0651
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-5.44% / 89.79%
||
7 Day CHG~0.00%
Published-01 Sep, 2004 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in the DNS resolver code used in libc, glibc, and libbind, as derived from ISC BIND, allows remote malicious DNS servers to cause a denial of service and possibly execute arbitrary code via the stub resolvers.

Action-Not Available
Vendor-n/aInternet Systems Consortium, Inc.
Product-bindn/a
CVE-2002-0029
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-21.85% / 95.54%
||
7 Day CHG~0.00%
Published-21 Nov, 2002 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflows in the DNS stub resolver library in ISC BIND 4.9.2 through 4.9.10, and other derived libraries such as BSD libc and GNU glibc, allow remote attackers to execute arbitrary code via DNS server responses that trigger the overflow in the (1) getnetbyname, or (2) getnetbyaddr functions, aka "LIBRESOLV: buffer overrun" and a different vulnerability than CVE-2002-0684.

Action-Not Available
Vendor-astaron/aInternet Systems Consortium, Inc.
Product-security_linuxbindn/a
CVE-1999-0808
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-1.58% / 80.82%
||
7 Day CHG~0.00%
Published-12 Sep, 2001 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple buffer overflows in ISC DHCP Distribution server (dhcpd) 1.0 and 2.0 allow a remote attacker to cause a denial of service (crash) and possibly execute arbitrary commands via long options.

Action-Not Available
Vendor-n/aInternet Systems Consortium, Inc.
Product-dhcp_clientn/a
CVE-1999-0705
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-6.63% / 90.81%
||
7 Day CHG~0.00%
Published-04 Jan, 2000 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in INN inews program.

Action-Not Available
Vendor-n/aRed Hat, Inc.Internet Systems Consortium, Inc.
Product-innlinuxn/a
CVE-1999-0833
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-1.52% / 80.48%
||
7 Day CHG~0.00%
Published-04 Jan, 2000 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in BIND 8.2 via NXT records.

Action-Not Available
Vendor-n/aSun Microsystems (Oracle Corporation)Internet Systems Consortium, Inc.
Product-solarissunosbindn/a
CVE-1999-0247
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-2.52% / 84.80%
||
7 Day CHG~0.00%
Published-13 Oct, 2000 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in nnrpd program in INN up to version 1.6 allows remote users to execute arbitrary commands.

Action-Not Available
Vendor-n/aInternet Systems Consortium, Inc.
Product-innn/a
Details not found