Vulnerabilities > GNU > Glibc > 2.1.3.10

DATE CVE VULNERABILITY TITLE RISK
2002-10-11 CVE-2002-1146 Unspecified vulnerability in GNU Glibc
The BIND 4 and BIND 8.2.x stub resolver libraries, and other libraries such as glibc 2.2.5 and earlier, libc, and libresolv, use the maximum buffer size instead of the actual size when processing a DNS response, which causes the stub resolvers to read past the actual boundary ("read buffer overflow"), allowing remote attackers to cause a denial of service (crash).
network
low complexity
gnu
5.0
2002-08-12 CVE-2002-0684 Remote Security vulnerability in glibc
Buffer overflow in DNS resolver functions that perform lookup of network names and addresses, as used in BIND 4.9.8 and ported to glibc 2.2.5 and earlier, allows remote malicious DNS servers to execute arbitrary code through a subroutine used by functions such as getnetbyname and getnetbyaddr.
network
low complexity
gnu isc
7.5
2000-12-19 CVE-2000-0959 Unspecified vulnerability in GNU Glibc 2.1.3.10
glibc2 does not properly clear the LD_DEBUG_OUTPUT and LD_DEBUG environmental variables when a program is spawned from a setuid program, which could allow local users to overwrite files via a symlink attack.
local
high complexity
gnu
1.2