nscd in the GNU C Library (aka glibc or libc6) before version 2.20 does not correctly compute the size of an internal buffer when processing netgroup requests, possibly leading to an nscd daemon crash or code execution as the user running nscd.
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2014-9984 from the MITRE CVE dictionary dictionary and NIST NVD.
This issue did not affect the versions of glibc as shipped with Red Hat Enterprise Linux 5 as they did not include support for netgroups. Red Hat Enterprise Linux 6 and 7 already include the fixed version of the package.
NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.
CVSS3 Base Score | 9.8 |
---|---|
CVSS3 Base Metrics | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Attack Vector | Network |
Attack Complexity | Low |
Privileges Required | None |
User Interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity Impact | High |
Availability Impact | High |
Platform | Package | State |
---|---|---|
Red Hat Enterprise Linux 7 | glibc | Not affected |
Red Hat Enterprise Linux 7 | compat-glibc | Not affected |
Red Hat Enterprise Linux 6 | glibc | Not affected |
Red Hat Enterprise Linux 6 | compat-glibc | Not affected |
Red Hat Enterprise Linux 5 | compat-glibc | Not affected |
Red Hat Enterprise Linux 5 | glibc | Not affected |