search menu icon-carat-right cmu-wordmark

CERT Coordination Center

inet_network() off-by-one buffer overflow

Vulnerability Note VU#203611

Original Release Date: 2008-01-25 | Last Revised: 2008-04-28

Overview

The inet_network() resolver function contains an off-by-one buffer overflow, which may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.

Description

The inet_network() function takes a character string representation for an internet address and returns the internet network number in integer form. inet_network() is implemented by various libbind, libc, and GNU libc versions. Applications that link against a vulnerable version of inet_network() may be vulnerable to a one-byte overflow.

Impact

A remote, unauthenticated attacker may be able to execute arbitrary code or cause a denial of service on a vulnerable system.

Solution

Apply an update

FreeBSD libc - Apply the patch in FreeBSD Security Advisory FreeBSD-SA-08:02.libc
GNU libc - This issue was resolved on February 11, 2000 in the main (diff) and glibc 2.1 (diff) branches
libbind - This issue will be resolved in libbind 9.3.5, 9.4.3, 2.5.0b2, or later. A patch is also available in the ISC Advisory

Vendor Information

203611
 

View all 51 vendors View less vendors


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to Mark Andrews of ISC for reporting this vulnerability.

This document was written by Will Dormann.

Other Information

CVE IDs: CVE-2008-0122
Severity Metric: 0.76
Date Public: 2007-12-10
Date First Published: 2008-01-25
Date Last Updated: 2008-04-28 13:54 UTC
Document Revision: 16

Sponsored by CISA.