Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2013-4458

Опубликовано: 12 дек. 2013
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 5

Описание

Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.18 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of AF_INET6 address results. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1914.

РелизСтатусПримечание
devel

not-affected

2.18-0ubuntu1
esm-infra-legacy/trusty

not-affected

2.18-0ubuntu1
lucid

released

2.11.1-0ubuntu7.14
precise

released

2.15-0ubuntu10.6
quantal

ignored

end of life
raring

ignored

end of life
saucy

ignored

end of life
trusty

not-affected

2.18-0ubuntu1
trusty/esm

not-affected

2.18-0ubuntu1
upstream

needs-triage

Показывать по

EPSS

Процентиль: 78%
0.01239
Низкий

5 Medium

CVSS2

Связанные уязвимости

redhat
почти 12 лет назад

Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.18 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of AF_INET6 address results. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1914.

nvd
больше 11 лет назад

Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.18 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of AF_INET6 address results. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1914.

debian
больше 11 лет назад

Stack-based buffer overflow in the getaddrinfo function in sysdeps/pos ...

github
больше 3 лет назад

Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.18 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of AF_INET6 address results. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1914.

fstec
больше 11 лет назад

Уязвимость библиотеки, обеспечивающей системные вызовы и основные функции glibc, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 78%
0.01239
Низкий

5 Medium

CVSS2