Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-5277

Опубликовано: 14 сент. 2015
Источник: redhat
CVSS2: 3.7
EPSS Низкий

Описание

The get_contents function in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) before 2.20 might allow local users to cause a denial of service (heap corruption) or gain privileges via a long line in the NSS files database.

It was discovered that the nss_files backend for the Name Service Switch in glibc would return incorrect data to applications or corrupt the heap (depending on adjacent heap contents). A local attacker could potentially use this flaw to execute arbitrary code on the system.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5glibcNot affected
Red Hat Enterprise Linux 6glibcNot affected
Red Hat Enterprise Linux 7glibcFixedRHSA-2015:217219.11.2015
Red Hat Enterprise Linux 7.1 Extended Update SupportglibcFixedRHSA-2015:258909.12.2015

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-119
https://bugzilla.redhat.com/show_bug.cgi?id=1262914glibc: data corruption while reading the NSS files database

EPSS

Процентиль: 27%
0.00091
Низкий

3.7 Low

CVSS2

Связанные уязвимости

ubuntu
больше 9 лет назад

The get_contents function in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) before 2.20 might allow local users to cause a denial of service (heap corruption) or gain privileges via a long line in the NSS files database.

nvd
больше 9 лет назад

The get_contents function in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) before 2.20 might allow local users to cause a denial of service (heap corruption) or gain privileges via a long line in the NSS files database.

debian
больше 9 лет назад

The get_contents function in nss_files/files-XXX.c in the Name Service ...

github
больше 3 лет назад

The get_contents function in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) before 2.20 might allow local users to cause a denial of service (heap corruption) or gain privileges via a long line in the NSS files database.

oracle-oval
почти 10 лет назад

ELSA-2015-2172: glibc security update (IMPORTANT)

EPSS

Процентиль: 27%
0.00091
Низкий

3.7 Low

CVSS2