CVE-2016-3075
01.06.2016, 20:59
Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.Enginsight
| Vendor | Product | Version |
|---|---|---|
| opensuse | opensuse | 13.2 |
| gnu | glibc | 𝑥 ≤ 2.23 |
| canonical | ubuntu_linux | 12.04 |
| canonical | ubuntu_linux | 14.04 |
| canonical | ubuntu_linux | 15.10 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Common Weakness Enumeration
References