SGI Information for VU#738331
Domain Name System (DNS) resolver libraries vulnerable to read buffer overflow
- Vendor Information Help Date Notified: 15 Aug 2002
- Statement Date:
- Date Updated: 23 Aug 2002
SGI uses nsd (UNS name service daemon) as a resolver and it does not appear to be vulnerable as it does not use any of the res_* functions.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us email.