CVE-2016-3075
01.06.2016, 20:59
Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.Enginsight
Vendor | Product | Version |
---|---|---|
opensuse | opensuse | 13.2 |
gnu | glibc | 𝑥 ≤ 2.23 |
canonical | ubuntu_linux | 12.04 |
canonical | ubuntu_linux | 14.04 |
canonical | ubuntu_linux | 15.10 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References