CVE-2008-0122 (GCVE-0-2008-0122)

Vulnerability from cvelistv5 – Published: 2008-01-16 01:00 – Updated: 2024-08-07 07:32
VLAI?
Summary
Off-by-one error in the inet_network function in libbind in ISC BIND 9.4.2 and earlier, as used in libc in FreeBSD 6.2 through 7.0-PRERELEASE, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted input that triggers memory corruption.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/28579 third-party-advisoryx_refsource_SECUNIA
https://bugzilla.redhat.com/show_bug.cgi?id=429149 x_refsource_CONFIRM
http://www.redhat.com/support/errata/RHSA-2008-03… vendor-advisoryx_refsource_REDHAT
http://www.securityfocus.com/bid/27283 vdb-entryx_refsource_BID
http://secunia.com/advisories/30538 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/archive/1/487000/100… mailing-listx_refsource_BUGTRAQ
http://www.kb.cert.org/vuls/id/203611 third-party-advisoryx_refsource_CERT-VN
http://security.freebsd.org/advisories/FreeBSD-SA… vendor-advisoryx_refsource_FREEBSD
http://www.vupen.com/english/advisories/2008/0703 vdb-entryx_refsource_VUPEN
http://support.avaya.com/elmodocs2/security/ASA-2… x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2008/1743… vdb-entryx_refsource_VUPEN
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
https://www.redhat.com/archives/fedora-package-an… vendor-advisoryx_refsource_FEDORA
http://secunia.com/advisories/28429 third-party-advisoryx_refsource_SECUNIA
https://issues.rpath.com/browse/RPL-2169 x_refsource_CONFIRM
http://www.securitytracker.com/id?1019189 vdb-entryx_refsource_SECTRACK
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
http://www14.software.ibm.com/webapp/set2/subscri… x_refsource_CONFIRM
http://secunia.com/advisories/28487 third-party-advisoryx_refsource_SECUNIA
http://www.isc.org/index.pl?/sw/bind/bind-security.php x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/30313 third-party-advisoryx_refsource_SECUNIA
http://www14.software.ibm.com/webapp/set2/subscri… x_refsource_CONFIRM
http://secunia.com/advisories/30718 third-party-advisoryx_refsource_SECUNIA
https://h20564.www2.hpe.com/portal/site/hpsc/publ… x_refsource_CONFIRM
http://secunia.com/advisories/29323 third-party-advisoryx_refsource_SECUNIA
http://sunsolve.sun.com/search/document.do?assetk… vendor-advisoryx_refsource_SUNALERT
http://secunia.com/advisories/29161 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/0193 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/28367 third-party-advisoryx_refsource_SECUNIA
https://www.redhat.com/archives/fedora-package-an… vendor-advisoryx_refsource_FEDORA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:32:24.383Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "28579",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28579"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=429149"
          },
          {
            "name": "RHSA-2008:0300",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2008-0300.html"
          },
          {
            "name": "27283",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/27283"
          },
          {
            "name": "30538",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30538"
          },
          {
            "name": "20080124 rPSA-2008-0029-1 bind bind-utils",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/487000/100/0/threaded"
          },
          {
            "name": "VU#203611",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/203611"
          },
          {
            "name": "FreeBSD-SA-08:02",
            "tags": [
              "vendor-advisory",
              "x_refsource_FREEBSD",
              "x_transferred"
            ],
            "url": "http://security.freebsd.org/advisories/FreeBSD-SA-08:02.libc.asc"
          },
          {
            "name": "ADV-2008-0703",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/0703"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-244.htm"
          },
          {
            "name": "ADV-2008-1743",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1743/references"
          },
          {
            "name": "oval:org.mitre.oval:def:10190",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10190"
          },
          {
            "name": "FEDORA-2008-0904",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00782.html"
          },
          {
            "name": "28429",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28429"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.rpath.com/browse/RPL-2169"
          },
          {
            "name": "1019189",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1019189"
          },
          {
            "name": "SUSE-SR:2008:006",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/ijhifoeblist?mode=7\u0026heading=AIX61\u0026path=/200802/SECURITY/20080227/datafile123640\u0026label=AIX%20libc%20inet_network%20buffer%20overflow"
          },
          {
            "name": "28487",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28487"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.isc.org/index.pl?/sw/bind/bind-security.php"
          },
          {
            "name": "freebsd-inetnetwork-bo(39670)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39670"
          },
          {
            "name": "30313",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30313"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=4167"
          },
          {
            "name": "30718",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30718"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488"
          },
          {
            "name": "29323",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29323"
          },
          {
            "name": "238493",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238493-1"
          },
          {
            "name": "29161",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29161"
          },
          {
            "name": "ADV-2008-0193",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/0193"
          },
          {
            "name": "28367",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28367"
          },
          {
            "name": "FEDORA-2008-0903",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00781.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-01-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Off-by-one error in the inet_network function in libbind in ISC BIND 9.4.2 and earlier, as used in libc in FreeBSD 6.2 through 7.0-PRERELEASE, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted input that triggers memory corruption."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-15T20:57:01",
        "orgId": "63664ac6-956c-4cba-a5d0-f46076e16109",
        "shortName": "freebsd"
      },
      "references": [
        {
          "name": "28579",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28579"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=429149"
        },
        {
          "name": "RHSA-2008:0300",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2008-0300.html"
        },
        {
          "name": "27283",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/27283"
        },
        {
          "name": "30538",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30538"
        },
        {
          "name": "20080124 rPSA-2008-0029-1 bind bind-utils",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/487000/100/0/threaded"
        },
        {
          "name": "VU#203611",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/203611"
        },
        {
          "name": "FreeBSD-SA-08:02",
          "tags": [
            "vendor-advisory",
            "x_refsource_FREEBSD"
          ],
          "url": "http://security.freebsd.org/advisories/FreeBSD-SA-08:02.libc.asc"
        },
        {
          "name": "ADV-2008-0703",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/0703"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-244.htm"
        },
        {
          "name": "ADV-2008-1743",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1743/references"
        },
        {
          "name": "oval:org.mitre.oval:def:10190",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10190"
        },
        {
          "name": "FEDORA-2008-0904",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00782.html"
        },
        {
          "name": "28429",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28429"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.rpath.com/browse/RPL-2169"
        },
        {
          "name": "1019189",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1019189"
        },
        {
          "name": "SUSE-SR:2008:006",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/ijhifoeblist?mode=7\u0026heading=AIX61\u0026path=/200802/SECURITY/20080227/datafile123640\u0026label=AIX%20libc%20inet_network%20buffer%20overflow"
        },
        {
          "name": "28487",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28487"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.isc.org/index.pl?/sw/bind/bind-security.php"
        },
        {
          "name": "freebsd-inetnetwork-bo(39670)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39670"
        },
        {
          "name": "30313",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30313"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=4167"
        },
        {
          "name": "30718",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30718"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488"
        },
        {
          "name": "29323",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29323"
        },
        {
          "name": "238493",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238493-1"
        },
        {
          "name": "29161",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29161"
        },
        {
          "name": "ADV-2008-0193",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/0193"
        },
        {
          "name": "28367",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28367"
        },
        {
          "name": "FEDORA-2008-0903",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00781.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secteam@freebsd.org",
          "ID": "CVE-2008-0122",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Off-by-one error in the inet_network function in libbind in ISC BIND 9.4.2 and earlier, as used in libc in FreeBSD 6.2 through 7.0-PRERELEASE, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted input that triggers memory corruption."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "28579",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28579"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=429149",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=429149"
            },
            {
              "name": "RHSA-2008:0300",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2008-0300.html"
            },
            {
              "name": "27283",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/27283"
            },
            {
              "name": "30538",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30538"
            },
            {
              "name": "20080124 rPSA-2008-0029-1 bind bind-utils",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/487000/100/0/threaded"
            },
            {
              "name": "VU#203611",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/203611"
            },
            {
              "name": "FreeBSD-SA-08:02",
              "refsource": "FREEBSD",
              "url": "http://security.freebsd.org/advisories/FreeBSD-SA-08:02.libc.asc"
            },
            {
              "name": "ADV-2008-0703",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/0703"
            },
            {
              "name": "http://support.avaya.com/elmodocs2/security/ASA-2008-244.htm",
              "refsource": "CONFIRM",
              "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-244.htm"
            },
            {
              "name": "ADV-2008-1743",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1743/references"
            },
            {
              "name": "oval:org.mitre.oval:def:10190",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10190"
            },
            {
              "name": "FEDORA-2008-0904",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00782.html"
            },
            {
              "name": "28429",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28429"
            },
            {
              "name": "https://issues.rpath.com/browse/RPL-2169",
              "refsource": "CONFIRM",
              "url": "https://issues.rpath.com/browse/RPL-2169"
            },
            {
              "name": "1019189",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1019189"
            },
            {
              "name": "SUSE-SR:2008:006",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html"
            },
            {
              "name": "http://www14.software.ibm.com/webapp/set2/subscriptions/ijhifoeblist?mode=7\u0026heading=AIX61\u0026path=/200802/SECURITY/20080227/datafile123640\u0026label=AIX%20libc%20inet_network%20buffer%20overflow",
              "refsource": "CONFIRM",
              "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/ijhifoeblist?mode=7\u0026heading=AIX61\u0026path=/200802/SECURITY/20080227/datafile123640\u0026label=AIX%20libc%20inet_network%20buffer%20overflow"
            },
            {
              "name": "28487",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28487"
            },
            {
              "name": "http://www.isc.org/index.pl?/sw/bind/bind-security.php",
              "refsource": "CONFIRM",
              "url": "http://www.isc.org/index.pl?/sw/bind/bind-security.php"
            },
            {
              "name": "freebsd-inetnetwork-bo(39670)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39670"
            },
            {
              "name": "30313",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30313"
            },
            {
              "name": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=4167",
              "refsource": "CONFIRM",
              "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=4167"
            },
            {
              "name": "30718",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30718"
            },
            {
              "name": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488",
              "refsource": "CONFIRM",
              "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488"
            },
            {
              "name": "29323",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29323"
            },
            {
              "name": "238493",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238493-1"
            },
            {
              "name": "29161",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29161"
            },
            {
              "name": "ADV-2008-0193",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/0193"
            },
            {
              "name": "28367",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28367"
            },
            {
              "name": "FEDORA-2008-0903",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00781.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "63664ac6-956c-4cba-a5d0-f46076e16109",
    "assignerShortName": "freebsd",
    "cveId": "CVE-2008-0122",
    "datePublished": "2008-01-16T01:00:00",
    "dateReserved": "2008-01-07T00:00:00",
    "dateUpdated": "2024-08-07T07:32:24.383Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"9.4.2\", \"matchCriteriaId\": \"27AB604E-DF87-4E96-A348-CED75A9A76FF\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:freebsd:freebsd:6.2:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"99009B85-61C6-4113-B3EF-40B8F330B65C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:freebsd:freebsd:6.2:p1:*:*:*:*:*:*\", \"matchCriteriaId\": \"34B2D56E-32CE-4892-958A-CE339F69D63C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:freebsd:freebsd:6.2:p10:*:*:*:*:*:*\", \"matchCriteriaId\": \"5320FE55-9641-4298-A2C3-98263891CAA1\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:freebsd:freebsd:6.2:p11:*:*:*:*:*:*\", \"matchCriteriaId\": \"70C230AE-27C9-4EFA-B413-74A42B2D1044\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:freebsd:freebsd:6.2:p12:*:*:*:*:*:*\", \"matchCriteriaId\": \"E9DB2F8F-0F2F-4FD4-92DC-E987B82F76C1\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:freebsd:freebsd:6.2:p4:*:*:*:*:*:*\", \"matchCriteriaId\": \"BBCED956-7969-40E0-8E45-8A8DB8C4473F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:freebsd:freebsd:6.2:p5:*:*:*:*:*:*\", \"matchCriteriaId\": \"285D90AC-242A-403F-BB38-A52459523B4A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:freebsd:freebsd:6.2:p6:*:*:*:*:*:*\", \"matchCriteriaId\": \"B7749CCD-6474-4E81-8C08-F44EF0C306A9\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:freebsd:freebsd:6.2:p7:*:*:*:*:*:*\", \"matchCriteriaId\": \"DDA9DC77-22F6-45A3-9726-9E16EBBC62BB\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:freebsd:freebsd:6.2:p8:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B6DB6EA-BF8A-402E-A1FD-CA674899E65E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:freebsd:freebsd:6.2:p9:*:*:*:*:*:*\", \"matchCriteriaId\": \"DD640B09-ABAB-4E6C-9AA4-937A4C7E63AC\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:freebsd:freebsd:6.2:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"C527F07A-A8A0-49DD-AEE8-095EEAF8FAA8\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:freebsd:freebsd:6.2:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"831F5B5E-BA5F-449E-B172-466606A868EB\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:freebsd:freebsd:6.3:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"2D9F4FEB-30E5-4EF6-BEB6-0F1A4DE7EFB9\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:freebsd:freebsd:6.3:p1:*:*:*:*:*:*\", \"matchCriteriaId\": \"BB6FC258-9735-4199-9499-ACFCEF30EE5E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:freebsd:freebsd:6.3:p10:*:*:*:*:*:*\", \"matchCriteriaId\": \"277D5B3F-A909-4135-B7AB-7A754A058AA0\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:freebsd:freebsd:6.3:p11:*:*:*:*:*:*\", \"matchCriteriaId\": \"E8D5B37F-85BA-4436-B0B5-2FF640535D68\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:freebsd:freebsd:6.3:p12:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2ADD6F7-6FC3-48A8-8942-E0CDA50D74DB\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:freebsd:freebsd:6.3:p13:*:*:*:*:*:*\", \"matchCriteriaId\": \"47137313-8B9D-4574-9189-1A807482D5A0\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:freebsd:freebsd:6.3:p14:*:*:*:*:*:*\", \"matchCriteriaId\": \"3DC070F4-8B34-4212-BD66-64305E8A5AFA\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:freebsd:freebsd:6.3:p15:*:*:*:*:*:*\", \"matchCriteriaId\": \"99EC1D5D-C805-4BBF-9419-D9B00EAC4922\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:freebsd:freebsd:6.3:p2:*:*:*:*:*:*\", \"matchCriteriaId\": \"BA825CA5-84B6-4DA4-9F7F-644E532185A8\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:freebsd:freebsd:6.3:p3:*:*:*:*:*:*\", \"matchCriteriaId\": \"90B64FDC-01C0-4A83-827D-31F477C0359B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:freebsd:freebsd:6.3:p4:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C826F67-CA6D-4DA4-B5E9-9F4FEFE3D6D1\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:freebsd:freebsd:6.3:p5:*:*:*:*:*:*\", \"matchCriteriaId\": \"D5666E87-F0CB-45FA-9AED-C7A0F383A559\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:freebsd:freebsd:6.3:p6:*:*:*:*:*:*\", \"matchCriteriaId\": \"6032AC16-C610-4D19-96A2-FA5233FC56B5\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:freebsd:freebsd:6.3:p7:*:*:*:*:*:*\", \"matchCriteriaId\": \"243B3C87-7899-4E1F-9488-D0AA0AFDDB03\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:freebsd:freebsd:6.3:p8:*:*:*:*:*:*\", \"matchCriteriaId\": \"E596C19A-0BD6-4A9E-A7E5-C86DE0616763\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:freebsd:freebsd:6.3:p9:*:*:*:*:*:*\", \"matchCriteriaId\": \"6A9AEE2B-EE04-4B51-B28E-E401E99BF63B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:freebsd:freebsd:6.3:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"492B1533-775F-446E-84A3-BB1BF27CC2BF\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:freebsd:freebsd:6.4:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"F0F3E8EE-7DA6-4A92-8A73-4785205E4BF6\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:freebsd:freebsd:6.4:p1:*:*:*:*:*:*\", \"matchCriteriaId\": \"A50D71A9-6046-46DE-9D7B-624165EAB074\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:freebsd:freebsd:6.4:p10:*:*:*:*:*:*\", \"matchCriteriaId\": \"971C97E8-1324-4F95-BD09-FBDAF127A7B0\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:freebsd:freebsd:6.4:p11:*:*:*:*:*:*\", \"matchCriteriaId\": \"F1BA5765-A75D-411F-8A77-4114D5BE5CAD\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:freebsd:freebsd:6.4:p2:*:*:*:*:*:*\", \"matchCriteriaId\": \"77823FF0-285C-40D5-BFCF-8B4AD6A025CD\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:freebsd:freebsd:6.4:p3:*:*:*:*:*:*\", \"matchCriteriaId\": \"E24AD132-4334-4A3D-A035-5D9E52AD48B6\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:freebsd:freebsd:6.4:p4:*:*:*:*:*:*\", \"matchCriteriaId\": \"5A0C7D2E-D7D8-464B-8DE8-49C4552D05A0\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:freebsd:freebsd:6.4:p5:*:*:*:*:*:*\", \"matchCriteriaId\": \"AC2C60BA-E0F5-44C3-AB03-9EE8503401E0\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:freebsd:freebsd:6.4:p6:*:*:*:*:*:*\", \"matchCriteriaId\": \"880342FB-2B63-4FB4-8B3A-87BFB81DEAD6\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:freebsd:freebsd:6.4:p7:*:*:*:*:*:*\", \"matchCriteriaId\": \"2EF0C9BB-9691-4382-A756-92521E2937FC\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:freebsd:freebsd:6.4:p8:*:*:*:*:*:*\", \"matchCriteriaId\": \"EDFB4A8B-8CA8-4C7A-B94E-C72F84FCEED6\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:freebsd:freebsd:6.4:p9:*:*:*:*:*:*\", \"matchCriteriaId\": \"A1912ACC-136C-4697-9021-598EDBFDAD6D\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Off-by-one error in the inet_network function in libbind in ISC BIND 9.4.2 and earlier, as used in libc in FreeBSD 6.2 through 7.0-PRERELEASE, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted input that triggers memory corruption.\"}, {\"lang\": \"es\", \"value\": \"Error por un paso en la funci\\u00f3n inet_network en libbind en ISC BIND 9.4.2 y versiones anteriores, como se utiliza en libc en FreeBSD 6.2 hasta la versi\\u00f3n 7.0-PRERELEASE, permite a atacantes dependientes del contexto provocar una denegaci\\u00f3n de servicio (ca\\u00edda) y posiblemente ejecutar c\\u00f3digo arbitrario a trav\\u00e9s de entradas manipuladas que desencadenan corrupci\\u00f3n de memoria.\"}]",
      "id": "CVE-2008-0122",
      "lastModified": "2024-11-21T00:41:12.843",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:C/I:C/A:C\", \"baseScore\": 10.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2008-01-16T02:00:00.000",
      "references": "[{\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html\", \"source\": \"secteam@freebsd.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/28367\", \"source\": \"secteam@freebsd.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/28429\", \"source\": \"secteam@freebsd.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/28487\", \"source\": \"secteam@freebsd.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/28579\", \"source\": \"secteam@freebsd.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/29161\", \"source\": \"secteam@freebsd.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/29323\", \"source\": \"secteam@freebsd.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/30313\", \"source\": \"secteam@freebsd.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/30538\", \"source\": \"secteam@freebsd.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/30718\", \"source\": \"secteam@freebsd.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://security.freebsd.org/advisories/FreeBSD-SA-08:02.libc.asc\", \"source\": \"secteam@freebsd.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://sunsolve.sun.com/search/document.do?assetkey=1-26-238493-1\", \"source\": \"secteam@freebsd.org\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://support.avaya.com/elmodocs2/security/ASA-2008-244.htm\", \"source\": \"secteam@freebsd.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.isc.org/index.pl?/sw/bind/bind-security.php\", \"source\": \"secteam@freebsd.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.kb.cert.org/vuls/id/203611\", \"source\": \"secteam@freebsd.org\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2008-0300.html\", \"source\": \"secteam@freebsd.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/487000/100/0/threaded\", \"source\": \"secteam@freebsd.org\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securityfocus.com/bid/27283\", \"source\": \"secteam@freebsd.org\", \"tags\": [\"Patch\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id?1019189\", \"source\": \"secteam@freebsd.org\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/0193\", \"source\": \"secteam@freebsd.org\", \"tags\": [\"Permissions Required\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/0703\", \"source\": \"secteam@freebsd.org\", \"tags\": [\"Permissions Required\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/1743/references\", \"source\": \"secteam@freebsd.org\", \"tags\": [\"Permissions Required\"]}, {\"url\": \"http://www14.software.ibm.com/webapp/set2/subscriptions/ijhifoeblist?mode=7\u0026heading=AIX61\u0026path=/200802/SECURITY/20080227/datafile123640\u0026label=AIX%20libc%20inet_network%20buffer%20overflow\", \"source\": \"secteam@freebsd.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=4167\", \"source\": \"secteam@freebsd.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=429149\", \"source\": \"secteam@freebsd.org\", \"tags\": [\"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/39670\", \"source\": \"secteam@freebsd.org\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488\", \"source\": \"secteam@freebsd.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://issues.rpath.com/browse/RPL-2169\", \"source\": \"secteam@freebsd.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10190\", \"source\": \"secteam@freebsd.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00781.html\", \"source\": \"secteam@freebsd.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00782.html\", \"source\": \"secteam@freebsd.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/28367\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/28429\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/28487\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/28579\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/29161\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/29323\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/30313\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/30538\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/30718\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://security.freebsd.org/advisories/FreeBSD-SA-08:02.libc.asc\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://sunsolve.sun.com/search/document.do?assetkey=1-26-238493-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://support.avaya.com/elmodocs2/security/ASA-2008-244.htm\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.isc.org/index.pl?/sw/bind/bind-security.php\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.kb.cert.org/vuls/id/203611\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2008-0300.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/487000/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securityfocus.com/bid/27283\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id?1019189\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/0193\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Permissions Required\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/0703\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Permissions Required\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/1743/references\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Permissions Required\"]}, {\"url\": \"http://www14.software.ibm.com/webapp/set2/subscriptions/ijhifoeblist?mode=7\u0026heading=AIX61\u0026path=/200802/SECURITY/20080227/datafile123640\u0026label=AIX%20libc%20inet_network%20buffer%20overflow\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=4167\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=429149\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/39670\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://issues.rpath.com/browse/RPL-2169\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10190\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00781.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00782.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
      "sourceIdentifier": "secteam@freebsd.org",
      "vendorComments": "[{\"organization\": \"Red Hat\", \"comment\": \"This issue did not affect the versions of GNU libc as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.\\n\\nThis issue affects the versions of libbind as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and 5, however the vulnerable function is not used by any shipped applications.  The Red Hat Security Response Team has therefore rated this issue as having low security impact, a future update may address this flaw. \\nhttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2008-0122\\n\\nAn update to Red Hat Enterprise Linux 5 was released to correct this issue:\\nhttps://rhn.redhat.com/errata/RHSA-2008-0300.html\", \"lastModified\": \"2008-05-21T00:00:00\"}]",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-189\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2008-0122\",\"sourceIdentifier\":\"secteam@freebsd.org\",\"published\":\"2008-01-16T02:00:00.000\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Off-by-one error in the inet_network function in libbind in ISC BIND 9.4.2 and earlier, as used in libc in FreeBSD 6.2 through 7.0-PRERELEASE, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted input that triggers memory corruption.\"},{\"lang\":\"es\",\"value\":\"Error por un paso en la funci\u00f3n inet_network en libbind en ISC BIND 9.4.2 y versiones anteriores, como se utiliza en libc en FreeBSD 6.2 hasta la versi\u00f3n 7.0-PRERELEASE, permite a atacantes dependientes del contexto provocar una denegaci\u00f3n de servicio (ca\u00edda) y posiblemente ejecutar c\u00f3digo arbitrario a trav\u00e9s de entradas manipuladas que desencadenan corrupci\u00f3n de memoria.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-189\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"9.4.2\",\"matchCriteriaId\":\"27AB604E-DF87-4E96-A348-CED75A9A76FF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:6.2:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"99009B85-61C6-4113-B3EF-40B8F330B65C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:6.2:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"34B2D56E-32CE-4892-958A-CE339F69D63C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:6.2:p10:*:*:*:*:*:*\",\"matchCriteriaId\":\"5320FE55-9641-4298-A2C3-98263891CAA1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:6.2:p11:*:*:*:*:*:*\",\"matchCriteriaId\":\"70C230AE-27C9-4EFA-B413-74A42B2D1044\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:6.2:p12:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9DB2F8F-0F2F-4FD4-92DC-E987B82F76C1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:6.2:p4:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBCED956-7969-40E0-8E45-8A8DB8C4473F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:6.2:p5:*:*:*:*:*:*\",\"matchCriteriaId\":\"285D90AC-242A-403F-BB38-A52459523B4A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:6.2:p6:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7749CCD-6474-4E81-8C08-F44EF0C306A9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:6.2:p7:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDA9DC77-22F6-45A3-9726-9E16EBBC62BB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:6.2:p8:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B6DB6EA-BF8A-402E-A1FD-CA674899E65E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:6.2:p9:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD640B09-ABAB-4E6C-9AA4-937A4C7E63AC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:6.2:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C527F07A-A8A0-49DD-AEE8-095EEAF8FAA8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:6.2:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"831F5B5E-BA5F-449E-B172-466606A868EB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:6.3:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D9F4FEB-30E5-4EF6-BEB6-0F1A4DE7EFB9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:6.3:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB6FC258-9735-4199-9499-ACFCEF30EE5E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:6.3:p10:*:*:*:*:*:*\",\"matchCriteriaId\":\"277D5B3F-A909-4135-B7AB-7A754A058AA0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:6.3:p11:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8D5B37F-85BA-4436-B0B5-2FF640535D68\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:6.3:p12:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2ADD6F7-6FC3-48A8-8942-E0CDA50D74DB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:6.3:p13:*:*:*:*:*:*\",\"matchCriteriaId\":\"47137313-8B9D-4574-9189-1A807482D5A0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:6.3:p14:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DC070F4-8B34-4212-BD66-64305E8A5AFA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:6.3:p15:*:*:*:*:*:*\",\"matchCriteriaId\":\"99EC1D5D-C805-4BBF-9419-D9B00EAC4922\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:6.3:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA825CA5-84B6-4DA4-9F7F-644E532185A8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:6.3:p3:*:*:*:*:*:*\",\"matchCriteriaId\":\"90B64FDC-01C0-4A83-827D-31F477C0359B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:6.3:p4:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C826F67-CA6D-4DA4-B5E9-9F4FEFE3D6D1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:6.3:p5:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5666E87-F0CB-45FA-9AED-C7A0F383A559\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:6.3:p6:*:*:*:*:*:*\",\"matchCriteriaId\":\"6032AC16-C610-4D19-96A2-FA5233FC56B5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:6.3:p7:*:*:*:*:*:*\",\"matchCriteriaId\":\"243B3C87-7899-4E1F-9488-D0AA0AFDDB03\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:6.3:p8:*:*:*:*:*:*\",\"matchCriteriaId\":\"E596C19A-0BD6-4A9E-A7E5-C86DE0616763\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:6.3:p9:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A9AEE2B-EE04-4B51-B28E-E401E99BF63B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:6.3:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"492B1533-775F-446E-84A3-BB1BF27CC2BF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:6.4:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0F3E8EE-7DA6-4A92-8A73-4785205E4BF6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:6.4:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A50D71A9-6046-46DE-9D7B-624165EAB074\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:6.4:p10:*:*:*:*:*:*\",\"matchCriteriaId\":\"971C97E8-1324-4F95-BD09-FBDAF127A7B0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:6.4:p11:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1BA5765-A75D-411F-8A77-4114D5BE5CAD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:6.4:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"77823FF0-285C-40D5-BFCF-8B4AD6A025CD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:6.4:p3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E24AD132-4334-4A3D-A035-5D9E52AD48B6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:6.4:p4:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A0C7D2E-D7D8-464B-8DE8-49C4552D05A0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:6.4:p5:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC2C60BA-E0F5-44C3-AB03-9EE8503401E0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:6.4:p6:*:*:*:*:*:*\",\"matchCriteriaId\":\"880342FB-2B63-4FB4-8B3A-87BFB81DEAD6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:6.4:p7:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EF0C9BB-9691-4382-A756-92521E2937FC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:6.4:p8:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDFB4A8B-8CA8-4C7A-B94E-C72F84FCEED6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:6.4:p9:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1912ACC-136C-4697-9021-598EDBFDAD6D\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html\",\"source\":\"secteam@freebsd.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/28367\",\"source\":\"secteam@freebsd.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/28429\",\"source\":\"secteam@freebsd.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/28487\",\"source\":\"secteam@freebsd.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/28579\",\"source\":\"secteam@freebsd.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/29161\",\"source\":\"secteam@freebsd.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/29323\",\"source\":\"secteam@freebsd.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/30313\",\"source\":\"secteam@freebsd.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/30538\",\"source\":\"secteam@freebsd.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/30718\",\"source\":\"secteam@freebsd.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://security.freebsd.org/advisories/FreeBSD-SA-08:02.libc.asc\",\"source\":\"secteam@freebsd.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-238493-1\",\"source\":\"secteam@freebsd.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2008-244.htm\",\"source\":\"secteam@freebsd.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.isc.org/index.pl?/sw/bind/bind-security.php\",\"source\":\"secteam@freebsd.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/203611\",\"source\":\"secteam@freebsd.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0300.html\",\"source\":\"secteam@freebsd.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/487000/100/0/threaded\",\"source\":\"secteam@freebsd.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/27283\",\"source\":\"secteam@freebsd.org\",\"tags\":[\"Patch\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1019189\",\"source\":\"secteam@freebsd.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/0193\",\"source\":\"secteam@freebsd.org\",\"tags\":[\"Permissions Required\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/0703\",\"source\":\"secteam@freebsd.org\",\"tags\":[\"Permissions Required\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/1743/references\",\"source\":\"secteam@freebsd.org\",\"tags\":[\"Permissions Required\"]},{\"url\":\"http://www14.software.ibm.com/webapp/set2/subscriptions/ijhifoeblist?mode=7\u0026heading=AIX61\u0026path=/200802/SECURITY/20080227/datafile123640\u0026label=AIX%20libc%20inet_network%20buffer%20overflow\",\"source\":\"secteam@freebsd.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=4167\",\"source\":\"secteam@freebsd.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=429149\",\"source\":\"secteam@freebsd.org\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/39670\",\"source\":\"secteam@freebsd.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488\",\"source\":\"secteam@freebsd.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://issues.rpath.com/browse/RPL-2169\",\"source\":\"secteam@freebsd.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10190\",\"source\":\"secteam@freebsd.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00781.html\",\"source\":\"secteam@freebsd.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00782.html\",\"source\":\"secteam@freebsd.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/28367\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/28429\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/28487\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/28579\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/29161\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/29323\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/30313\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/30538\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/30718\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://security.freebsd.org/advisories/FreeBSD-SA-08:02.libc.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-238493-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2008-244.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.isc.org/index.pl?/sw/bind/bind-security.php\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/203611\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0300.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/487000/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/27283\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1019189\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/0193\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/0703\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/1743/references\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\"]},{\"url\":\"http://www14.software.ibm.com/webapp/set2/subscriptions/ijhifoeblist?mode=7\u0026heading=AIX61\u0026path=/200802/SECURITY/20080227/datafile123640\u0026label=AIX%20libc%20inet_network%20buffer%20overflow\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=4167\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=429149\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/39670\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://issues.rpath.com/browse/RPL-2169\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10190\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00781.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00782.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}],\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"This issue did not affect the versions of GNU libc as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.\\n\\nThis issue affects the versions of libbind as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and 5, however the vulnerable function is not used by any shipped applications.  The Red Hat Security Response Team has therefore rated this issue as having low security impact, a future update may address this flaw. \\nhttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2008-0122\\n\\nAn update to Red Hat Enterprise Linux 5 was released to correct this issue:\\nhttps://rhn.redhat.com/errata/RHSA-2008-0300.html\",\"lastModified\":\"2008-05-21T00:00:00\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…