PUBLISHED DATE: November 29, 2002CVE-2002-1221: Denial of Service Vulnerability
CVSS:
5
EPSS:
366.10%
Exploitability:
10
In KEV:
No
Description
BIND 8.x through 8.3.3 allows remote attackers to cause a denial of service (crash) via SIG RR elements with invalid expiry times, which are removed from the internal BIND database and later cause a null dereference.
Products
ISC BIND 8.1.1
ISC BIND 8.1.1
ISC BIND 8.1.2
ISC BIND 8.1.2
ISC BIND 8.1
ISC BIND 8.1
ISC BIND 8.2.1
ISC BIND 8.2.1
ISC BIND 8.2.2
ISC BIND 8.2.2
ISC BIND 8.2.2
ISC BIND 8.2.2 Patch 1
ISC BIND 8.2.2 Patch 1
ISC BIND 8.2.2 Patch 2
ISC BIND 8.2.2 Patch 2
ISC BIND 8.2.2 Patch 3
ISC BIND 8.2.2 Patch 3
ISC BIND 8.2.2 Patch 4
ISC BIND 8.2.2 Patch 4
ISC BIND 8.2.2 Patch 5
ISC BIND 8.2.2 Patch 5
ISC BIND 8.2.2 Patch 6
ISC BIND 8.2.2 Patch 6
ISC BIND 8.2.2 Patch 7
ISC BIND 8.2.2 Patch 7
ISC BIND 8.2.3
ISC BIND 8.2.3
ISC BIND 8.2.3 T1a
ISC BIND 8.2.3 T1a
ISC BIND 8.2.3 T9b
ISC BIND 8.2.3 T9b
ISC BIND 8.2.4
ISC BIND 8.2.4
ISC BIND 8.2.5
ISC BIND 8.2.5
ISC BIND 8.2.6
ISC BIND 8.2.6
ISC BIND 8.2
ISC BIND 8.2
ISC BIND 8.2
ISC BIND 8.2 Patch 1
ISC BIND 8.2 Patch 1
ISC BIND 8.3.0
ISC BIND 8.3.0
ISC BIND 8.3.1
ISC BIND 8.3.1
ISC BIND 8.3.2
ISC BIND 8.3.2
ISC BIND 8.3.3
ISC BIND 8.3.3
FreeBSD 4.4
FreeBSD 4.4
FreeBSD 4.4 Patch 27
FreeBSD 4.4 Patch 41
FreeBSD 4.4 Patch 42
FreeBSD 4.4 Patch 44
FreeBSD 4.4 Patch 45
FreeBSD 4.4 Patch 46
FreeBSD 4.4 Patch 47
FreeBSD 4.4 Patch 4
FreeBSD 4.4 Patch 8
FreeBSD 4.5
FreeBSD 4.5
FreeBSD 4.5 Patch 1
FreeBSD 4.5 Patch 20
FreeBSD 4.5 Patch 31
FreeBSD 4.5 Patch 32
FreeBSD 4.5 Patch 34
FreeBSD 4.5 Patch 35
FreeBSD 4.5 Patch 36
FreeBSD 4.5 Patch 37
FreeBSD 4.6
FreeBSD 4.6
FreeBSD 4.6 Patch 11
FreeBSD 4.6 Patch 12
FreeBSD 4.6 Patch 16
FreeBSD 4.6 Patch 19
FreeBSD 4.6 Patch 20
FreeBSD 4.6 Patch 23
FreeBSD 4.6 Patch 24
FreeBSD 4.6 Patch 25
FreeBSD 4.6 Patch 7
FreeBSD 4.7
FreeBSD 4.7
FreeBSD 4.7 Patch 13
FreeBSD 4.7 Patch 16
FreeBSD 4.7 Patch 17
FreeBSD 4.7 Patch 19
FreeBSD 4.7 Patch 20
FreeBSD 4.7 Patch 21
FreeBSD 4.7 Patch 22
FreeBSD 4.7 Patch 23
FreeBSD 4.7 Patch 24
FreeBSD 4.7 Patch 25
FreeBSD 4.7 Patch 26
FreeBSD 4.7 Patch 27
FreeBSD 4.7 Patch 28
FreeBSD 4.7 Patch 4
FreeBSD 4.7 Patch 5
FreeBSD 4.7 Patch 6
FreeBSD 4.7 Patch 8
FreeBSD 4.7 Patch 9
OpenBSD 3.0
OpenBSD 3.1
OpenBSD 3.2
Questions to Ask Vendors
Can you confirm whether your systems are affected by CVE-2002-1221, and if so, what steps are you currently taking to mitigate this vulnerability?
What is your estimated timeline for fully resolving CVE-2002-1221 in your products or services, and how will you communicate updates on this issue to us as your customer?