Bug 25220 - bind-8.2.2_P7 tsig bug
bind-8.2.2_P7 tsig bug
Status: CLOSED DUPLICATE of bug 25209
Product: Red Hat Linux
Classification: Retired
Component: bind (Show other bugs)
6.2
All Linux
medium Severity medium
: ---
: ---
Assigned To: Bernhard Rosenkraenzer
David Lawrence
http://www.isc.org/products/BIND/bind...
: Security
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2001-01-29 15:36 EST by Richard C. Greenwood
Modified: 2007-04-18 12:30 EDT (History)
0 users

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2001-01-29 15:36:49 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Richard C. Greenwood 2001-01-29 15:36:30 EST
Name: "tsig bug"

Versions affected: 8.2, 8.2-P1, 8.2.1, 8.2.2-P1, 8.2.2-P2, 8.2.2-P3,
8.2.2-P4, 8.2.2-P5, 8.2.2-P6, 8.2.2-P7, and all 8.2.3-betas
Severity: CRITICAL
Exploitable: Remotely
Type: Access possible.

Description: It is possible to overflow a buffer handling TSIG signed
queries, thereby obtaining access to the system. 

Workarounds: None. 
Active Exploits: Exploits for this bug exist.
Comment 1 Bernhard Rosenkraenzer 2001-01-29 16:10:09 EST

*** This bug has been marked as a duplicate of 25209 ***

Note You need to log in before you can comment on or make changes to this bug.