Логотип exploitDog
bind:CVE-2026-4437
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-4437

Количество 6

Количество 6

ubuntu логотип

CVE-2026-4437

20 дней назад

Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2026-4437

20 дней назад

Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer.

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2026-4437

20 дней назад

Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer.

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2026-4437

19 дней назад

gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response

CVSS3: 5.9
EPSS: Низкий
debian логотип

CVE-2026-4437

20 дней назад

Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.co ...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-m5wq-r4r4-4qrh

20 дней назад

Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer.

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2026-4437

Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer.

CVSS3: 7.5
0%
Низкий
20 дней назад
redhat логотип
CVE-2026-4437

Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer.

CVSS3: 6.5
0%
Низкий
20 дней назад
nvd логотип
CVE-2026-4437

Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer.

CVSS3: 7.5
0%
Низкий
20 дней назад
msrc логотип
CVE-2026-4437

gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response

CVSS3: 5.9
0%
Низкий
19 дней назад
debian логотип
CVE-2026-4437

Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.co ...

CVSS3: 7.5
0%
Низкий
20 дней назад
github логотип
GHSA-m5wq-r4r4-4qrh

Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer.

CVSS3: 7.5
0%
Низкий
20 дней назад

Уязвимостей на страницу