Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-3075

Опубликовано: 01 июн. 2016
Источник: debian
EPSS Средний

Описание

Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
glibcfixed2.22-6package
glibcfixed2.19-18+deb8u5jessiepackage
eglibcremovedpackage
eglibcno-dsawheezypackage

Примечания

  • https://sourceware.org/bugzilla/show_bug.cgi?id=19879

EPSS

Процентиль: 94%
0.12185
Средний

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 9 лет назад

Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.

CVSS3: 7
redhat
больше 9 лет назад

Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.

CVSS3: 7.5
nvd
больше 9 лет назад

Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.

CVSS3: 7.5
github
больше 3 лет назад

Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.

oracle-oval
почти 9 лет назад

ELSA-2016-3638: glibc security update (LOW)

EPSS

Процентиль: 94%
0.12185
Средний