Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-8778

Опубликовано: 19 апр. 2016
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 7.5
CVSS3: 9.8

Описание

Integer overflow in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via the size argument to the __hcreate_r function, which triggers out-of-bounds heap-memory access.

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

not-affected

2.19-0ubuntu6.8
precise

released

2.15-0ubuntu10.14
precise/esm

not-affected

2.15-0ubuntu10.14
trusty

released

2.19-0ubuntu6.8
trusty/esm

not-affected

2.19-0ubuntu6.8
upstream

needed

vivid

DNE

vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

Показывать по

РелизСтатусПримечание
devel

not-affected

2.23-0ubuntu1
esm-infra-legacy/trusty

DNE

esm-infra/xenial

not-affected

2.23-0ubuntu1
precise

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

needed

vivid

ignored

end of life
vivid/stable-phone-overlay

ignored

end of life

Показывать по

EPSS

Процентиль: 91%
0.06604
Низкий

7.5 High

CVSS2

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 8.1
redhat
больше 10 лет назад

Integer overflow in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via the size argument to the __hcreate_r function, which triggers out-of-bounds heap-memory access.

CVSS3: 9.8
nvd
больше 9 лет назад

Integer overflow in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via the size argument to the __hcreate_r function, which triggers out-of-bounds heap-memory access.

CVSS3: 9.8
debian
больше 9 лет назад

Integer overflow in the GNU C Library (aka glibc or libc6) before 2.23 ...

CVSS3: 9.8
github
больше 3 лет назад

Integer overflow in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via the size argument to the __hcreate_r function, which triggers out-of-bounds heap-memory access.

oracle-oval
больше 8 лет назад

ELSA-2017-0680: glibc security and bug fix update (MODERATE)

EPSS

Процентиль: 91%
0.06604
Низкий

7.5 High

CVSS2

9.8 Critical

CVSS3