BIND 9 before 9.2.1 susceptible to DoS via malformed DNS packet, improperly handled in dns_message_findtype()
Reporter | Title | Published | Views | Family All 8 |
---|---|---|---|---|
![]() | ISC BIND 9 fails to process additional data chains in responses correctly thereby causing the server to fail an internal consistency check | 4 Jun 200200:00 | – | cert |
![]() | remote denial of service attack in bind9, bind9-beta | 6 Jun 200202:48 | – | suse |
![]() | CVE-2002-0400 | 18 Jun 200204:00 | – | nvd |
![]() | ISC BIND < 9.2.1 rdataset Parameter Malformed DNS Packet DoS | 22 Jul 200200:00 | – | nessus |
![]() | RHEL 2.1 : bind (RHSA-2002:119) | 6 Jul 200400:00 | – | nessus |
![]() | Mandrake Linux Security Advisory : bind (MDKSA-2002:038-1) | 31 Jul 200400:00 | – | nessus |
![]() | Advisory CA-2002-15 Denial-of-Service Vulnerability in ISC BIND 9 | 5 Jun 200200:00 | – | securityvulns |
![]() | CVE-2002-0400 | 1 Sep 200404:00 | – | cvelist |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo