Описание
Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | not-affected | 2.19-0ubuntu6 |
lucid | released | 2.11.1-0ubuntu7.20 |
precise | released | 2.15-0ubuntu10.10 |
trusty | not-affected | 2.19-0ubuntu6 |
trusty/esm | not-affected | 2.19-0ubuntu6 |
upstream | not-affected | 2.18 |
utopic | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 2.19-10ubuntu2 |
esm-infra-legacy/trusty | DNE | |
lucid | DNE | |
precise | DNE | |
trusty | DNE | |
trusty/esm | DNE | |
upstream | not-affected | 2.18 |
utopic | not-affected | 2.19-10ubuntu2 |
Показывать по
EPSS
10 Critical
CVSS2
Связанные уязвимости
Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."
Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."
Heap-based buffer overflow in the __nss_hostname_digits_dots function ...
Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."
EPSS
10 Critical
CVSS2