Computer Security
[EN] securityvulns.ru no-pyccku


GNU glibc gethostbyname functions buffer overflow
Published:02.02.2015
Source:
SecurityVulns ID:14240
Type:library
Threat Level:
9/10
Description:Buffer overflow in __nss_hostname_digits_dots().
Affected:GNU : glibc 2.18
CVE:CVE-2015-0235 (Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST.")
Original documentdocumentQualys Security Advisory, Qualys Security Advisory CVE-2015-0235 - GHOST: glibc gethostbyname buffer overflow (02.02.2015)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod