Описание
Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | released | 2.19-0ubuntu6.8 |
precise | released | 2.15-0ubuntu10.14 |
precise/esm | not-affected | 2.15-0ubuntu10.14 |
trusty | released | 2.19-0ubuntu6.8 |
trusty/esm | released | 2.19-0ubuntu6.8 |
upstream | needs-triage | |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
wily | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | |
esm-infra-legacy/trusty | DNE | |
esm-infra/xenial | not-affected | 2.23-0ubuntu3 |
precise | DNE | |
precise/esm | DNE | |
trusty | DNE | |
trusty/esm | DNE | |
upstream | released | 2.22-6 |
vivid/stable-phone-overlay | ignored | end of life |
vivid/ubuntu-core | released | 2.21-0ubuntu4.0.7 |
Показывать по
EPSS
5 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.
Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.
Stack-based buffer overflow in the nss_dns implementation of the getne ...
Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.
EPSS
5 Medium
CVSS2
7.5 High
CVSS3