CVE-2002-0029

NameCVE-2002-0029
DescriptionBuffer overflows in the DNS stub resolver library in ISC BIND 4.9.2 through 4.9.10, and other derived libraries such as BSD libc and GNU glibc, allow remote attackers to execute arbitrary code via DNS server responses that trigger the overflow in the (1) getnetbyname, or (2) getnetbyaddr functions, aka "LIBRESOLV: buffer overrun" and a different vulnerability than CVE-2002-0684.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-196

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
bind9 (PTS)bullseye1:9.16.50-1~deb11u2fixed
bullseye (security)1:9.16.50-1~deb11u4fixed
bookworm1:9.18.33-1~deb12u2fixed
bookworm (security)1:9.18.41-1~deb12u1fixed
trixie1:9.20.11-4fixed
trixie (security)1:9.20.15-1~deb13u1fixed
forky, sid1:9.20.15-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
bindsourcewoody8.3.3-2.0woody1DSA-196
bindsource(unstable)1:8.3.3-3
bind9source(unstable)(not affected)

Search for package or bug name: Reporting problems