CVE-2008-0122

Impact:
Low
Public Date:
2008-01-14
CWE:
CWE-193
Bugzilla:
429149: CVE-2008-0122 libbind off-by-one buffer overflow

The MITRE CVE dictionary describes this issue as:

Off-by-one error in the inet_network function in libbind in ISC BIND 9.4.2 and earlier, as used in libc in FreeBSD 6.2 through 7.0-PRERELEASE, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted input that triggers memory corruption.

Find out more about CVE-2008-0122 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

This issue did not affect the versions of GNU libc as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.

This issue affects the versions of libbind as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and 5, however the vulnerable function is not used by any shipped applications. The Red Hat Security Response Team has therefore rated this issue as having low security impact, a future update may address this flaw.
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2008-0122

An update to Red Hat Enterprise Linux 5 was released to correct this issue:
https://rhn.redhat.com/errata/RHSA-2008-0300.html

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 5 (bind) RHSA-2008:0300 2008-05-20

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 4 bind Will not fix

Last Modified

CVE description copyright © 2017, The MITRE Corporation

Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.