SB2008091001 - Input validation error in Glibc



SB2008091001 - Input validation error in Glibc

Published: September 10, 2008 Updated: June 3, 2025

Security Bulletin ID SB2008091001
Severity
Medium
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Input validation error (CVE-ID: CVE-2002-1146)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The BIND 4 and BIND 8.2.x stub resolver libraries, and other libraries such as glibc 2.2.5 and earlier, libc, and libresolv, use the maximum buffer size instead of the actual size when processing a DNS response, which causes the stub resolvers to read past the actual boundary ("read buffer overflow"), allowing remote attackers to cause a denial of service (crash).


Remediation

Install update from vendor's website.