SB2016101855 - Input validation error in Glibc 



SB2016101855 - Input validation error in Glibc

Published: October 18, 2016 Updated: June 3, 2025

Security Bulletin ID SB2016101855
Severity
Medium
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Input validation error (CVE-ID: CVE-2002-0684)

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

Buffer overflow in DNS resolver functions that perform lookup of network names and addresses, as used in BIND 4.9.8 and ported to glibc 2.2.5 and earlier, allows remote malicious DNS servers to execute arbitrary code through a subroutine used by functions such as getnetbyname and getnetbyaddr.


Remediation

Install update from vendor's website.