djbdns Information for VU#738331
Domain Name System (DNS) resolver libraries vulnerable to read buffer overflow
- Vendor Information Help Date Notified: 14 Aug 2002
- Statement Date:
- Date Updated: 01 Oct 2002
djbdns does not have these bugs. djbdns has never used any BIND-derived code. djbdns, including the djbdns client library, is covered by a $500 security guarantee. The djbdns client library is free for use by other packages in place of BIND's libresolv. See http://cr.yp.to/djbdns.html.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us email.