Computer Security
[EN] securityvulns.ru no-pyccku


GNU glibc security vulnerabilities
Published:05.05.2015
Source:
SecurityVulns ID:14431
Type:library
Threat Level:
9/10
Description:Ğ¿gethostbyname_r() buffer overflow, getaddrinfo() race conditions.
Affected:GNU : glibc 2.19
CVE:CVE-2015-1781 (Buffer overflow in the gethostbyname_r and other unspecified NSS functions in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response, which triggers a call with a misaligned buffer.)
 CVE-2013-7423 (The send_dg function in resolv/res_send.c in GNU C Library (aka glibc or libc6) before 2.20 does not properly reuse file descriptors, which allows remote attackers to send DNS queries to unintended locations via a large number of request that trigger a call to the getaddrinfo function.)
Original documentdocumentMANDRIVA, [ MDVSA-2015:218 ] glibc (05.05.2015)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod