Search Results (184 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2002-1219 3 Freebsd, Isc, Openbsd 3 Freebsd, Bind, Openbsd 2025-04-03 N/A
Buffer overflow in named in BIND 4 versions 4.9.10 and earlier, and 8 versions 8.3.3 and earlier, allows remote attackers to execute arbitrary code via a certain DNS server response containing SIG resource records (RR).
CVE-1999-0010 8 Data General, Ibm, Isc and 5 more 11 Dg Ux, Aix, Bind and 8 more 2025-04-03 N/A
Denial of Service vulnerability in BIND 8 Releases via maliciously formatted DNS messages.
CVE-1999-0024 6 Bsdi, Ibm, Isc and 3 more 12 Bsd Os, Aix, Bind and 9 more 2025-04-03 N/A
DNS cache poisoning via BIND, by predictable query IDs.
CVE-1999-0184 1 Isc 1 Bind 2025-04-03 N/A
When compiled with the -DALLOW_UPDATES option, bind allows dynamic updates to the DNS server, allowing for malicious modification of DNS records.
CVE-1999-0833 2 Isc, Sun 3 Bind, Solaris, Sunos 2025-04-03 N/A
Buffer overflow in BIND 8.2 via NXT records.
CVE-1999-0837 2 Isc, Sun 3 Bind, Solaris, Sunos 2025-04-03 N/A
Denial of service in BIND by improperly closing TCP sessions via so_linger.
CVE-1999-0848 2 Isc, Sun 3 Bind, Solaris, Sunos 2025-04-03 N/A
Denial of service in BIND named via consuming more than "fdmax" file descriptors.
CVE-1999-0849 1 Isc 1 Bind 2025-04-03 N/A
Denial of service in BIND named via maxdname.
CVE-1999-1499 1 Isc 1 Bind 2025-04-03 N/A
named in ISC BIND 4.9 and 8.1 allows local users to destroy files via a symlink attack on (1) named_dump.db when root kills the process with a SIGINT, or (2) named.stats when SIGIOT is used.
CVE-2000-0335 2 Gnu, Isc 2 Glibc, Bind 2025-04-03 N/A
The resolver in glibc 2.1.3 uses predictable IDs, which allows a local attacker to spoof DNS query results.
CVE-2000-0887 1 Isc 1 Bind 2025-04-03 N/A
named in BIND 8.2 through 8.2.2-P6 allows remote attackers to cause a denial of service by making a compressed zone transfer (ZXFR) request and performing a name service query on an authoritative record that is not cached, aka the "zxfr bug."
CVE-2000-0888 2 Debian, Isc 2 Debian Linux, Bind 2025-04-03 N/A
named in BIND 8.2 through 8.2.2-P6 allows remote attackers to cause a denial of service by sending an SRV record to the server, aka the "srv bug."
CVE-2000-1029 1 Isc 1 Bind 2025-04-03 N/A
Buffer overflow in host command allows a remote attacker to execute arbitrary commands via a long response to an AXFR query.
CVE-2001-0010 2 Isc, Redhat 2 Bind, Linux 2025-04-03 N/A
Buffer overflow in transaction signature (TSIG) handling code in BIND 8 allows remote attackers to gain root privileges.
CVE-2001-0011 2 Isc, Redhat 2 Bind, Linux 2025-04-03 N/A
Buffer overflow in nslookupComplain function in BIND 4 allows remote attackers to gain root privileges.
CVE-2001-0012 2 Isc, Redhat 2 Bind, Linux 2025-04-03 N/A
BIND 4 and BIND 8 allow remote attackers to access sensitive information such as environment variables.
CVE-2001-0013 2 Isc, Redhat 2 Bind, Linux 2025-04-03 N/A
Format string vulnerability in nslookupComplain function in BIND 4 allows remote attackers to gain root privileges.
CVE-2001-0497 1 Isc 1 Bind 2025-04-03 7.8 High
dnskeygen in BIND 8.2.4 and earlier, and dnssec-keygen in BIND 9.1.2 and earlier, set insecure permissions for a HMAC-MD5 shared secret key file used for DNS Transactional Signatures (TSIG), which allows attackers to obtain the keys and perform dynamic DNS updates.
CVE-2002-0029 3 Astaro, Isc, Redhat 3 Security Linux, Bind, Enterprise Linux 2025-04-03 N/A
Buffer overflows in the DNS stub resolver library in ISC BIND 4.9.2 through 4.9.10, and other derived libraries such as BSD libc and GNU glibc, allow remote attackers to execute arbitrary code via DNS server responses that trigger the overflow in the (1) getnetbyname, or (2) getnetbyaddr functions, aka "LIBRESOLV: buffer overrun" and a different vulnerability than CVE-2002-0684.
CVE-2002-0400 2 Isc, Redhat 3 Bind, Enterprise Linux, Linux 2025-04-03 N/A
ISC BIND 9 before 9.2.1 allows remote attackers to cause a denial of service (shutdown) via a malformed DNS packet that triggers an error condition that is not properly handled when the rdataset parameter to the dns_message_findtype() function in message.c is not NULL, aka DoS_findtype.