Lucene search

K
redhatRedHatRHSA-2004:383
HistoryAug 04, 2004 - 12:00 a.m.

(RHSA-2004:383) glibc security update

2004-08-0400:00:00
access.redhat.com
24

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.936 High

EPSS

Percentile

98.9%

The GNU libc packages (known as glibc) contain the standard C libraries
used by applications.

A security audit of the glibc packages in Red Hat Enterprise Linux 2.1
found a flaw in the resolver library which was originally reported as
affecting versions of ISC BIND 4.9. This flaw also applied to glibc
versions before 2.3.2. An attacker who is able to send DNS responses
(perhaps by creating a malicious DNS server) could remotely exploit this
vulnerability to execute arbitrary code or cause a denial of service. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CAN-2002-0029 to this issue.

These updated packages also fix a dlclose function bug on certain shared
libraries, which caused program crashes.

All users of glibc should upgrade to these updated packages, which
resolve these issues.

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.936 High

EPSS

Percentile

98.9%