Описание
Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra-legacy/trusty | not-affected | 2.19-0ubuntu6 |
| lucid | released | 2.11.1-0ubuntu7.20 |
| precise | released | 2.15-0ubuntu10.10 |
| trusty | not-affected | 2.19-0ubuntu6 |
| trusty/esm | not-affected | 2.19-0ubuntu6 |
| upstream | not-affected | 2.18 |
| utopic | DNE |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 2.19-10ubuntu2 |
| esm-infra-legacy/trusty | DNE | |
| lucid | DNE | |
| precise | DNE | |
| trusty | DNE | |
| trusty/esm | DNE | |
| upstream | not-affected | 2.18 |
| utopic | not-affected | 2.19-10ubuntu2 |
Показывать по
EPSS
10 Critical
CVSS2
Связанные уязвимости
Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."
Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."
Heap-based buffer overflow in the __nss_hostname_digits_dots function ...
Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."
EPSS
10 Critical
CVSS2