Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2016-3075

Опубликовано: 01 июн. 2016
Источник: ubuntu
Приоритет: low
EPSS Средний
CVSS2: 5
CVSS3: 7.5

Описание

Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

released

2.19-0ubuntu6.8
precise

released

2.15-0ubuntu10.14
precise/esm

not-affected

2.15-0ubuntu10.14
trusty

released

2.19-0ubuntu6.8
trusty/esm

released

2.19-0ubuntu6.8
upstream

needs-triage

vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

wily

DNE

Показывать по

РелизСтатусПримечание
devel

not-affected

esm-infra-legacy/trusty

DNE

esm-infra/xenial

not-affected

2.23-0ubuntu3
precise

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

2.22-6
vivid/stable-phone-overlay

ignored

end of life
vivid/ubuntu-core

released

2.21-0ubuntu4.0.7

Показывать по

EPSS

Процентиль: 93%
0.11367
Средний

5 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7
redhat
больше 9 лет назад

Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.

CVSS3: 7.5
nvd
больше 9 лет назад

Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.

CVSS3: 7.5
debian
больше 9 лет назад

Stack-based buffer overflow in the nss_dns implementation of the getne ...

CVSS3: 7.5
github
больше 3 лет назад

Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.

oracle-oval
почти 9 лет назад

ELSA-2016-3638: glibc security update (LOW)

EPSS

Процентиль: 93%
0.11367
Средний

5 Medium

CVSS2

7.5 High

CVSS3