6.8
CVSSv2

CVE-2015-1781

Published: 28/09/2015 Updated: 13/02/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in the gethostbyname_r and other unspecified NSS functions in the GNU C Library (aka glibc or libc6) prior to 2.22 allows context-dependent malicious users to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response, which triggers a call with a misaligned buffer.

Vulnerable Product Search on Vulmon Subscribe to Product

suse linux enterprise server 11

suse linux enterprise desktop 11

suse linux enterprise debuginfo 11

gnu glibc

debian debian linux 7.0

canonical ubuntu linux 12.04

canonical ubuntu linux 14.04

canonical ubuntu linux 15.04

Vendor Advisories

Synopsis Important: glibc security update Type/Severity Security Advisory: Important Topic Updated glibc packages that fix multiple security issues are now availablefor Red Hat Enterprise Linux 71 Extended Update SupportRed Hat Product Security has rated this update as having Important securityimpact Com ...
Synopsis Moderate: glibc security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic Updated glibc packages that fix multiple security issues, several bugs, andadd one enhancement are now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as ...
Several security issues were fixed in the GNU C Library ...
USN-2985-1 introduced a regression in the GNU C Library ...
Debian Bug report logs - #796105 CVE-2015-1781 Package: src:glibc; Maintainer for src:glibc is GNU Libc Maintainers <debian-glibc@listsdebianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Wed, 19 Aug 2015 14:03:01 UTC Severity: important Tags: security Fixed in versions glibc/221-0experimental1, gli ...
Debian Bug report logs - #803927 glibc: multiple overflows in strxfrm() Package: src:glibc; Maintainer for src:glibc is GNU Libc Maintainers <debian-glibc@listsdebianorg>; Reported by: Raphael Hertzog <hertzog@debianorg> Date: Tue, 3 Nov 2015 10:00:02 UTC Severity: serious Tags: fixed-upstream, security Found in ...
Debian Bug report logs - #798316 libc6: Pointer guarding bypass in dynamic Setuid binaries Package: libc6; Maintainer for libc6 is GNU Libc Maintainers <debian-glibc@listsdebianorg>; Source for libc6 is src:glibc (PTS, buildd, popcon) Reported by: Hideki Yamane <henrich@debianorjp> Date: Tue, 8 Sep 2015 01:24:02 ...
Debian Bug report logs - #717544 CVE-2013-2207: Remove pt_chown Package: libc-bin; Maintainer for libc-bin is GNU Libc Maintainers <debian-glibc@listsdebianorg>; Source for libc-bin is src:glibc (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@inutilorg> Date: Mon, 22 Jul 2013 06:39:02 UTC Severity: imp ...
Debian Bug report logs - #779587 glibc: Three vulnerabilities Package: src:glibc; Maintainer for src:glibc is GNU Libc Maintainers <debian-glibc@listsdebianorg>; Reported by: Moritz Muehlenhoff <jmm@inutilorg> Date: Mon, 2 Mar 2015 18:42:02 UTC Severity: important Tags: patch, security Merged with 808819 Found i ...
A buffer overflow flaw was found in the way glibc's gethostbyname_r() and other related functions computed the size of a buffer when passed a misaligned buffer as input An attacker able to make an application call any of these functions with a misaligned buffer could use this flaw to crash the application or, potentially, execute arbitrary code wi ...
A buffer overflow flaw was found in the way glibc's gethostbyname_r() and other related functions computed the size of a buffer when passed a misaligned buffer as input An attacker able to make an application call any of these functions with a misaligned buffer could use this flaw to crash the application or, potentially, execute arbitrary code wi ...
A buffer overflow flaw was found in the way glibc's gethostbyname_r() and other related functions computed the size of a buffer when passed a misaligned buffer as input An attacker able to make an application call any of these functions with a misaligned buffer could use this flaw to crash the application or, potentially, execute arbitrary code wi ...