Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-0235

Опубликовано: 28 янв. 2015
Источник: debian
EPSS Высокий

Описание

Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."

Пакеты

ПакетСтатусВерсия исправленияРелизТип
eglibcremovedpackage
glibcfixed2.18-1package

Примечания

  • https://sourceware.org/bugzilla/show_bug.cgi?id=15014

EPSS

Процентиль: 100%
0.89535
Высокий

Связанные уязвимости

ubuntu
больше 10 лет назад

Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."

redhat
больше 10 лет назад

Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."

nvd
больше 10 лет назад

Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."

github
около 3 лет назад

Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."

oracle-oval
больше 10 лет назад

ELSA-2015-0092: glibc security update (CRITICAL)

EPSS

Процентиль: 100%
0.89535
Высокий