Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) prior to 2.24 allows context-dependent malicious users to cause a denial of service (stack consumption and application crash) via a long name.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
opensuse opensuse 13.2 |
||
gnu glibc |
||
fedoraproject fedora 23 |
||
canonical ubuntu linux 12.04 |
||
canonical ubuntu linux 15.10 |
||
canonical ubuntu linux 14.04 |