CVE-2002-1146

Impact:
Moderate
Public Date:
2002-10-03
Bugzilla:
1616843: CVE-2002-1146 security flaw

The MITRE CVE dictionary describes this issue as:

The BIND 4 and BIND 8.2.x stub resolver libraries, and other libraries such as glibc 2.2.5 and earlier, libc, and libresolv, use the maximum buffer size instead of the actual size when processing a DNS response, which causes the stub resolvers to read past the actual boundary ("read buffer overflow"), allowing remote attackers to cause a denial of service (crash).

Find out more about CVE-2002-1146 from the MITRE CVE dictionary dictionary and NIST NVD.

Red Hat Security Errata

Platform Errata Release Date
Red Hat Linux 7.1 RHSA-2002:197 2002-10-04
Red Hat Linux 6.2 RHSA-2002:197 2002-10-04
Red Hat Linux 7.3 RHSA-2002:197 2002-10-04
Red Hat Linux 7.0 RHSA-2002:197 2002-10-04
Red Hat Enterprise Linux 2.1 RHSA-2003:022 2003-01-30
Red Hat Linux 7.1 RHSA-2003:212 2003-06-26
Red Hat Linux 7.2 RHSA-2002:197 2002-10-04

Last Modified

CVE description copyright © 2017, The MITRE Corporation

Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.