Total
169 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2001-0013 | 1 Isc | 1 Bind | 2008-09-10 | 10.0 HIGH | N/A |
Format string vulnerability in nslookupComplain function in BIND 4 allows remote attackers to gain root privileges. | |||||
CVE-2001-0012 | 1 Isc | 1 Bind | 2008-09-10 | 5.0 MEDIUM | N/A |
BIND 4 and BIND 8 allow remote attackers to access sensitive information such as environment variables. | |||||
CVE-2001-0011 | 1 Isc | 1 Bind | 2008-09-10 | 10.0 HIGH | N/A |
Buffer overflow in nslookupComplain function in BIND 4 allows remote attackers to gain root privileges. | |||||
CVE-2001-0010 | 1 Isc | 1 Bind | 2008-09-10 | 10.0 HIGH | N/A |
Buffer overflow in transaction signature (TSIG) handling code in BIND 8 allows remote attackers to gain root privileges. | |||||
CVE-2000-0335 | 2 Gnu, Isc | 2 Glibc, Bind | 2008-09-10 | 7.5 HIGH | N/A |
The resolver in glibc 2.1.3 uses predictable IDs, which allows a local attacker to spoof DNS query results. | |||||
CVE-1999-0849 | 1 Isc | 1 Bind | 2008-09-09 | 5.0 MEDIUM | N/A |
Denial of service in BIND named via maxdname. | |||||
CVE-2002-2213 | 2 Infoblox, Isc | 2 Dns One, Bind | 2008-09-05 | 5.0 MEDIUM | N/A |
The DNS resolver in unspecified versions of Infoblox DNS One, when resolving recursive DNS queries for arbitrary hosts, allows remote attackers to conduct DNS cache poisoning via a birthday attack that uses a large number of open queries for the same resource record (RR) combined with spoofed responses, which increases the possibility of successfully spoofing a response in a way that is more efficient than brute force methods. | |||||
CVE-2002-2212 | 2 Fujitsu, Isc | 2 Uxp V, Bind | 2008-09-05 | 5.0 MEDIUM | N/A |
The DNS resolver in unspecified versions of Fujitsu UXP/V, when resolving recursive DNS queries for arbitrary hosts, allows remote attackers to conduct DNS cache poisoning via a birthday attack that uses a large number of open queries for the same resource record (RR) combined with spoofed responses, which increases the possibility of successfully spoofing a response in a way that is more efficient than brute force methods. | |||||
CVE-1999-1499 | 1 Isc | 1 Bind | 2008-09-05 | 2.1 LOW | N/A |
named in ISC BIND 4.9 and 8.1 allows local users to destroy files via a symlink attack on (1) named_dump.db when root kills the process with a SIGINT, or (2) named.stats when SIGIOT is used. |