Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-9402

Опубликовано: 24 фев. 2015
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 7.8

Описание

The nss_dns implementation of getnetbyname in GNU C Library (aka glibc) before 2.21, when the DNS backend in the Name Service Switch configuration is enabled, allows remote attackers to cause a denial of service (infinite loop) by sending a positive answer while a network name is being process.

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

released

2.19-0ubuntu6.6
lucid

released

2.11.1-0ubuntu7.21
precise

released

2.15-0ubuntu10.11
trusty

released

2.19-0ubuntu6.6
trusty/esm

released

2.19-0ubuntu6.6
upstream

needs-triage

utopic

DNE

Показывать по

РелизСтатусПримечание
devel

not-affected

2.19-15ubuntu1
esm-infra-legacy/trusty

DNE

lucid

DNE

precise

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

2.21
utopic

released

2.19-10ubuntu2.3

Показывать по

EPSS

Процентиль: 87%
0.03217
Низкий

7.8 High

CVSS2

Связанные уязвимости

redhat
почти 11 лет назад

The nss_dns implementation of getnetbyname in GNU C Library (aka glibc) before 2.21, when the DNS backend in the Name Service Switch configuration is enabled, allows remote attackers to cause a denial of service (infinite loop) by sending a positive answer while a network name is being process.

nvd
больше 10 лет назад

The nss_dns implementation of getnetbyname in GNU C Library (aka glibc) before 2.21, when the DNS backend in the Name Service Switch configuration is enabled, allows remote attackers to cause a denial of service (infinite loop) by sending a positive answer while a network name is being process.

debian
больше 10 лет назад

The nss_dns implementation of getnetbyname in GNU C Library (aka glibc ...

github
больше 3 лет назад

The nss_dns implementation of getnetbyname in GNU C Library (aka glibc) before 2.21, when the DNS backend in the Name Service Switch configuration is enabled, allows remote attackers to cause a denial of service (infinite loop) by sending a positive answer while a network name is being process.

suse-cvrf
больше 10 лет назад

Security update for glibc

EPSS

Процентиль: 87%
0.03217
Низкий

7.8 High

CVSS2