ID CVE-2013-7423
Summary The send_dg function in resolv/res_send.c in GNU C Library (aka glibc or libc6) before 2.20 does not properly reuse file descriptors, which allows remote attackers to send DNS queries to unintended locations via a large number of requests that trigger a call to the getaddrinfo function.
References
Vulnerable Configurations
  • Red Hat Enterprise Linux Server Advanced mission critical Update Support (AUS) 6.5
    cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5
  • Canonical Ubuntu Linux 10.04 LTS
    cpe:2.3:o:canonical:ubuntu_linux:10.04:-:-:-:lts
  • Canonical Ubuntu Linux 12.04 LTS
    cpe:2.3:o:canonical:ubuntu_linux:12.04:-:-:-:lts
  • Canonical Ubuntu Linux 14.04 LTS (Long-Term Support)
    cpe:2.3:o:canonical:ubuntu_linux:14.04:-:-:-:lts
  • Canonical Ubuntu Linux 14.10
    cpe:2.3:o:canonical:ubuntu_linux:14.10
  • OpenSUSE 13.1
    cpe:2.3:o:opensuse:opensuse:13.1
  • OpenSUSE 13.2
    cpe:2.3:o:opensuse:opensuse:13.2
  • GNU glibc
    cpe:2.3:a:gnu:glibc
  • GNU glibc 0.1
    cpe:2.3:a:gnu:glibc:0.1
  • GNU glibc 0.4
    cpe:2.3:a:gnu:glibc:0.4
  • GNU glibc 0.4.1
    cpe:2.3:a:gnu:glibc:0.4.1
  • GNU glibc 0.5
    cpe:2.3:a:gnu:glibc:0.5
  • GNU glibc 0.6
    cpe:2.3:a:gnu:glibc:0.6
  • GNU glibc 1.00
    cpe:2.3:a:gnu:glibc:1.00
  • GNU glibc 1.01
    cpe:2.3:a:gnu:glibc:1.01
  • GNU glibc 1.02
    cpe:2.3:a:gnu:glibc:1.02
  • GNU glibc 1.03
    cpe:2.3:a:gnu:glibc:1.03
  • GNU glibc 1.04
    cpe:2.3:a:gnu:glibc:1.04
  • GNU glibc 1.05
    cpe:2.3:a:gnu:glibc:1.05
  • GNU glibc 1.06
    cpe:2.3:a:gnu:glibc:1.06
  • GNU glibc 1.06.1
    cpe:2.3:a:gnu:glibc:1.06.1
  • GNU glibc 1.06.2
    cpe:2.3:a:gnu:glibc:1.06.2
  • GNU glibc 1.06.3
    cpe:2.3:a:gnu:glibc:1.06.3
  • GNU glibc 1.06.4
    cpe:2.3:a:gnu:glibc:1.06.4
  • GNU glibc 1.06.6
    cpe:2.3:a:gnu:glibc:1.06.6
  • GNU glibc 1.06.7
    cpe:2.3:a:gnu:glibc:1.06.7
  • GNU glibc 1.06.8
    cpe:2.3:a:gnu:glibc:1.06.8
  • GNU glibc 1.06.9
    cpe:2.3:a:gnu:glibc:1.06.9
  • GNU glibc 1.06.10
    cpe:2.3:a:gnu:glibc:1.06.10
  • GNU glibc 1.06.11
    cpe:2.3:a:gnu:glibc:1.06.11
  • GNU glibc 1.06.12
    cpe:2.3:a:gnu:glibc:1.06.12
  • GNU glibc 1.06.13
    cpe:2.3:a:gnu:glibc:1.06.13
  • GNU glibc 1.07
    cpe:2.3:a:gnu:glibc:1.07
  • GNU glibc 1.07.1
    cpe:2.3:a:gnu:glibc:1.07.1
  • GNU glibc 1.07.2
    cpe:2.3:a:gnu:glibc:1.07.2
  • GNU glibc 1.07.3
    cpe:2.3:a:gnu:glibc:1.07.3
  • GNU glibc 1.07.4
    cpe:2.3:a:gnu:glibc:1.07.4
  • GNU glibc 1.07.5
    cpe:2.3:a:gnu:glibc:1.07.5
  • GNU glibc 1.07.6
    cpe:2.3:a:gnu:glibc:1.07.6
  • GNU glibc 1.08
    cpe:2.3:a:gnu:glibc:1.08
  • GNU glibc 1.08.1
    cpe:2.3:a:gnu:glibc:1.08.1
  • GNU glibc 1.08.3
    cpe:2.3:a:gnu:glibc:1.08.3
  • GNU glibc 1.08.4
    cpe:2.3:a:gnu:glibc:1.08.4
  • GNU glibc 1.08.5
    cpe:2.3:a:gnu:glibc:1.08.5
  • GNU glibc 1.08.6
    cpe:2.3:a:gnu:glibc:1.08.6
  • GNU glibc 1.08.7
    cpe:2.3:a:gnu:glibc:1.08.7
  • GNU glibc 1.08.8
    cpe:2.3:a:gnu:glibc:1.08.8
  • GNU glibc 1.08.9
    cpe:2.3:a:gnu:glibc:1.08.9
  • GNU glibc 1.08.10
    cpe:2.3:a:gnu:glibc:1.08.10
  • GNU glibc 1.08.11
    cpe:2.3:a:gnu:glibc:1.08.11
  • GNU glibc 1.08.12
    cpe:2.3:a:gnu:glibc:1.08.12
  • GNU glibc 1.08.13
    cpe:2.3:a:gnu:glibc:1.08.13
  • GNU glibc 1.08.14
    cpe:2.3:a:gnu:glibc:1.08.14
  • GNU glibc 1.09
    cpe:2.3:a:gnu:glibc:1.09
  • GNU glibc 1.09.1
    cpe:2.3:a:gnu:glibc:1.09.1
  • GNU glibc 1.09.2
    cpe:2.3:a:gnu:glibc:1.09.2
  • GNU glibc 1.09.3
    cpe:2.3:a:gnu:glibc:1.09.3
  • GNU glibc 1.09.5
    cpe:2.3:a:gnu:glibc:1.09.5
  • GNU glibc 2.0
    cpe:2.3:a:gnu:glibc:2.0
  • GNU glibc 2.0.1
    cpe:2.3:a:gnu:glibc:2.0.1
  • GNU glibc 2.0.2
    cpe:2.3:a:gnu:glibc:2.0.2
  • GNU glibc 2.0.3
    cpe:2.3:a:gnu:glibc:2.0.3
  • GNU glibc 2.0.4
    cpe:2.3:a:gnu:glibc:2.0.4
  • GNU glibc 2.0.5
    cpe:2.3:a:gnu:glibc:2.0.5
  • GNU glibc 2.0.6
    cpe:2.3:a:gnu:glibc:2.0.6
  • GNU glibc 2.1
    cpe:2.3:a:gnu:glibc:2.1
  • GNU glibc 2.1.1
    cpe:2.3:a:gnu:glibc:2.1.1
  • GNU glibc 2.1.1.6
    cpe:2.3:a:gnu:glibc:2.1.1.6
  • GNU glibc 2.1.2
    cpe:2.3:a:gnu:glibc:2.1.2
  • GNU glibc 2.1.3
    cpe:2.3:a:gnu:glibc:2.1.3
  • GNU glibc 2.1.3.10
    cpe:2.3:a:gnu:glibc:2.1.3.10
  • GNU glibc 2.1.9
    cpe:2.3:a:gnu:glibc:2.1.9
  • GNU glibc 2.2
    cpe:2.3:a:gnu:glibc:2.2
  • GNU glibc 2.2.1
    cpe:2.3:a:gnu:glibc:2.2.1
  • GNU glibc 2.2.2
    cpe:2.3:a:gnu:glibc:2.2.2
  • GNU glibc 2.2.3
    cpe:2.3:a:gnu:glibc:2.2.3
  • GNU glibc 2.2.4
    cpe:2.3:a:gnu:glibc:2.2.4
  • GNU glibc 2.2.5
    cpe:2.3:a:gnu:glibc:2.2.5
  • GNU glibc 2.3
    cpe:2.3:a:gnu:glibc:2.3
  • GNU glibc 2.3.1
    cpe:2.3:a:gnu:glibc:2.3.1
  • GNU glibc 2.3.2
    cpe:2.3:a:gnu:glibc:2.3.2
  • GNU glibc 2.3.3
    cpe:2.3:a:gnu:glibc:2.3.3
  • GNU glibc 2.3.4
    cpe:2.3:a:gnu:glibc:2.3.4
  • GNU glibc 2.3.5
    cpe:2.3:a:gnu:glibc:2.3.5
  • GNU glibc 2.3.6
    cpe:2.3:a:gnu:glibc:2.3.6
  • GNU glibc 2.3.10
    cpe:2.3:a:gnu:glibc:2.3.10
  • GNU glibc 2.4
    cpe:2.3:a:gnu:glibc:2.4
  • GNU glibc 2.5
    cpe:2.3:a:gnu:glibc:2.5
  • GNU glibc 2.5.1
    cpe:2.3:a:gnu:glibc:2.5.1
  • GNU glibc 2.6
    cpe:2.3:a:gnu:glibc:2.6
  • GNU glibc 2.6.1
    cpe:2.3:a:gnu:glibc:2.6.1
  • GNU glibc 2.7
    cpe:2.3:a:gnu:glibc:2.7
  • GNU glibc 2.8
    cpe:2.3:a:gnu:glibc:2.8
  • GNU glibc 2.9
    cpe:2.3:a:gnu:glibc:2.9
  • GNU glibc 2.10
    cpe:2.3:a:gnu:glibc:2.10
  • GNU glibc 2.10.1
    cpe:2.3:a:gnu:glibc:2.10.1
  • GNU glibc 2.10.2
    cpe:2.3:a:gnu:glibc:2.10.2
  • GNU glibc 2.11
    cpe:2.3:a:gnu:glibc:2.11
  • GNU glibc 2.11.1
    cpe:2.3:a:gnu:glibc:2.11.1
  • GNU glibc 2.11.2
    cpe:2.3:a:gnu:glibc:2.11.2
  • GNU glibc 2.11.3
    cpe:2.3:a:gnu:glibc:2.11.3
  • GNU glibc 2.12
    cpe:2.3:a:gnu:glibc:2.12
  • GNU glibc 2.12.0
    cpe:2.3:a:gnu:glibc:2.12.0
  • GNU glibc 2.12.1
    cpe:2.3:a:gnu:glibc:2.12.1
  • GNU glibc 2.12.2
    cpe:2.3:a:gnu:glibc:2.12.2
  • GNU glibc 2.13
    cpe:2.3:a:gnu:glibc:2.13
  • GNU glibc 2.14
    cpe:2.3:a:gnu:glibc:2.14
  • GNU glibc 2.14.1
    cpe:2.3:a:gnu:glibc:2.14.1
  • GNU glibc 2.15
    cpe:2.3:a:gnu:glibc:2.15
  • GNU glibc 2.16
    cpe:2.3:a:gnu:glibc:2.16
  • GNU glibc 2.17
    cpe:2.3:a:gnu:glibc:2.17
  • GNU glibc 2.18
    cpe:2.3:a:gnu:glibc:2.18
  • GNU glibc 2.19
    cpe:2.3:a:gnu:glibc:2.19
CVSS
Base: 5.0 (as of 20-07-2016 - 13:28)
Impact:
Exploitability:
CWE CWE-17
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
nessus via4
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-201602-02.NASL
    description The remote host is affected by the vulnerability described in GLSA-201602-02 (GNU C Library: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in the GNU C Library: The Google Security Team and Red Hat discovered a stack-based buffer overflow in the send_dg() and send_vc() functions due to a buffer mismanagement when getaddrinfo() is called with AF_UNSPEC (CVE-2015-7547). The strftime() function access invalid memory when passed out-of-range data, resulting in a crash (CVE-2015-8776). An integer overflow was found in the __hcreate_r() function (CVE-2015-8778). Multiple unbounded stack allocations were found in the catopen() function (CVE-2015-8779). Please review the CVEs referenced below for additional vulnerabilities that had already been fixed in previous versions of sys-libs/glibc, for which we have not issued a GLSA before. Impact : A remote attacker could exploit any application which performs host name resolution using getaddrinfo() in order to execute arbitrary code or crash the application. The other vulnerabilities can possibly be exploited to cause a Denial of Service or leak information. Workaround : A number of mitigating factors for CVE-2015-7547 have been identified. Please review the upstream advisory and references below.
    last seen 2019-02-21
    modified 2017-01-27
    plugin id 88822
    published 2016-02-18
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=88822
    title GLSA-201602-02 : GNU C Library: Multiple vulnerabilities
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2016-1207.NASL
    description An update for glibc is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es) : * It was discovered that, under certain circumstances, glibc's getaddrinfo() function would send DNS queries to random file descriptors. An attacker could potentially use this flaw to send DNS queries to unintended recipients, resulting in information disclosure or data loss due to the application encountering corrupted data. (CVE-2013-7423)
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 91497
    published 2016-06-07
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=91497
    title RHEL 6 : glibc (RHSA-2016:1207)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_GLIBC-150226.NASL
    description glibc has ben updated to fix three security issues : - wordexp failed to honour WRDE_NOCMD (bsc#906371). (CVE-2014-7817) - Fixed invalid file descriptor reuse while sending DNS query (bsc#915526). (CVE-2013-7423) - Fixed buffer overflow in wscanf (bsc#916222) These non-security issues have been fixed:. (CVE-2015-1472) - Remove inaccurate assembler implementations of ceill, floorl, nearbyintl, roundl, truncl for PowerPC64 (bsc#917072) - Don't return IPv4 addresses when looking for IPv6 addresses only (bsc#904461)
    last seen 2019-02-21
    modified 2016-02-28
    plugin id 81667
    published 2015-03-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=81667
    title SuSE 11.3 Security Update : glibc (SAT Patch Number 10357)
  • NASL family OracleVM Local Security Checks
    NASL id ORACLEVM_OVMSA-2015-0055.NASL
    description The remote OracleVM system is missing necessary patches to address critical security updates : - Fix invalid file descriptor reuse while sending DNS query (#1207995, CVE-2013-7423). - Fix buffer overflow in gethostbyname_r with misaligned buffer (#1209375, CVE-2015-1781). - Enhance nscd to detect any configuration file changes (#1194149).
    last seen 2019-02-21
    modified 2018-07-24
    plugin id 82983
    published 2015-04-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=82983
    title OracleVM 3.3 : glibc (OVMSA-2015-0055)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2015-2589.NASL
    description Updated glibc packages that fix multiple security issues are now available for Red Hat Enterprise Linux 7.1 Extended Update Support. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the Name Server Caching Daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. It was discovered that the nss_files backend for the Name Service Switch in glibc would return incorrect data to applications or corrupt the heap (depending on adjacent heap contents). A local attacker could potentially use this flaw to execute arbitrary code on the system. (CVE-2015-5277) It was discovered that, under certain circumstances, glibc's getaddrinfo() function would send DNS queries to random file descriptors. An attacker could potentially use this flaw to send DNS queries to unintended recipients, resulting in information disclosure or data loss due to the application encountering corrupted data. (CVE-2013-7423) A buffer overflow flaw was found in the way glibc's gethostbyname_r() and other related functions computed the size of a buffer when passed a misaligned buffer as input. An attacker able to make an application call any of these functions with a misaligned buffer could use this flaw to crash the application or, potentially, execute arbitrary code with the permissions of the user running the application. (CVE-2015-1781) A heap-based buffer overflow flaw and a stack overflow flaw were found in glibc's swscanf() function. An attacker able to make an application call the swscanf() function could use these flaws to crash that application or, potentially, execute arbitrary code with the permissions of the user running the application. (CVE-2015-1472, CVE-2015-1473) The CVE-2015-5277 issue was discovered by Sumit Bose and Lukas Slebodnik of Red Hat, and the CVE-2015-1781 issue was discovered by Arjun Shankar of Red Hat. All glibc users are advised to upgrade to these updated packages, which contain backported patches to correct these issues.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 88573
    published 2016-02-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=88573
    title RHEL 7 : glibc (RHSA-2015:2589)
  • NASL family OracleVM Local Security Checks
    NASL id ORACLEVM_OVMSA-2016-0013.NASL
    description The remote OracleVM system is missing necessary patches to address critical security updates : - Update fix for CVE-2015-7547 (#1296028). - Create helper threads with enough stack for POSIX AIO and timers (#1301625). - Fix CVE-2015-7547: getaddrinfo stack-based buffer overflow (#1296028). - Support loading more libraries with static TLS (#1291270). - Check for NULL arena pointer in _int_pvalloc (#1256890). - Don't change no_dyn_threshold on mallopt failure (#1256891). - Unlock main arena after allocation in calloc (#1256812). - Enable robust malloc change again (#1256812). - Fix perturbing in malloc on free and simply perturb_byte (#1256812). - Don't fall back to mmap prematurely (#1256812). - The malloc deadlock avoidance support has been temporarily removed since it triggers deadlocks in certain applications (#1244002). - Fix ruserok check to reject, not skip, negative user checks (#1217186). - Optimize ruserok function for large ~/.rhosts (#1217186). - Fix crash in valloc due to the backtrace deadlock fix (#1207236). - Fix buffer overflow in gethostbyname_r with misaligned buffer (#1209376, CVE-2015-1781). - Avoid deadlock in malloc on backtrace (#1066724). - Support running applications that use Intel AVX-512 (#1195453). - Silence logging of record type mismatch for DNSSEC records (#1088301). - Shrink heap on free when vm.overcommit_memory == 2 (#867679). - Enhance nscd to detect any configuration file changes (#859965). - Fix __times handling of EFAULT when buf is NULL (#1124204). - Fix memory leak with dlopen and thread-local storage variables (#978098). - Prevent getaddrinfo from writing DNS queries to random fd (CVE-2013-7423, - Implement userspace half of in6.h header coordination (#1053178). - Correctely size relocation cache used by profiler (#1144132). - Fix reuse of cached stack leading to bounds overrun of DTV (#1116050). - Return failure in getnetgrent only when all netgroups have been searched (#1085312). - Fix valgrind warning in nscd_stats (#1091915). - Initialize xports array (#1159167). - Fix tst-default-attr test to not fail on powerpc (#1023306). - Fix parsing of numeric hosts in gethostbyname_r (CVE-2015-0235, #1183534). - Fix typo in nscd/selinux.c (#1125307). - Actually run test-iconv modules (#1176907). - Fix recursive dlopen (#1154563). - Fix crashes on invalid input in IBM gconv modules (CVE-2014-6040, #1172044). - Fix wordexp to honour WRDE_NOCMD (CVE-2014-7817, #1171296). - Fix typo in res_send and res_query (#rh1138769).
    last seen 2019-02-21
    modified 2018-07-24
    plugin id 88783
    published 2016-02-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=88783
    title OracleVM 3.3 : glibc (OVMSA-2016-0013) (GHOST)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-2519-1.NASL
    description Arnaud Le Blanc discovered that the GNU C Library incorrectly handled file descriptors when resolving DNS queries under high load. This may cause a denial of service in other applications, or an information leak. This issue only affected Ubuntu 10.04 LTS, Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2013-7423) It was discovered that the GNU C Library incorrectly handled receiving a positive answer while processing the network name when performing DNS resolution. A remote attacker could use this issue to cause the GNU C Library to hang, resulting in a denial of service. (CVE-2014-9402) Joseph Myers discovered that the GNU C Library wscanf function incorrectly handled memory. A remote attacker could possibly use this issue to cause the GNU C Library to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 12.04 LTS, Ubuntu 14.04 LTS and Ubuntu 14.10. (CVE-2015-1472, CVE-2015-1473). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 81572
    published 2015-02-27
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=81572
    title Ubuntu 10.04 LTS / 12.04 LTS / 14.04 LTS / 14.10 : eglibc, glibc vulnerabilities (USN-2519-1)
  • NASL family Amazon Linux Local Security Checks
    NASL id ALA_ALAS-2015-617.NASL
    description A buffer overflow flaw was found in the way glibc's gethostbyname_r() and other related functions computed the size of a buffer when passed a misaligned buffer as input. An attacker able to make an application call any of these functions with a misaligned buffer could use this flaw to crash the application or, potentially, execute arbitrary code with the permissions of the user running the application. (CVE-2015-1781) It was discovered that the nss_files backend for the Name Service Switch in glibc would return incorrect data to applications or corrupt the heap (depending on adjacent heap contents). A local attacker could potentially use this flaw to execute arbitrary code on the system. (CVE-2015-5277) It was discovered that, under certain circumstances, glibc's getaddrinfo() function would send DNS queries to random file descriptors. An attacker could potentially use this flaw to send DNS queries to unintended recipients, resulting in information disclosure or data loss due to the application encountering corrupted data. (CVE-2013-7423) A stack overflow flaw was found in glibc's swscanf() function. An attacker able to make an application call the swscanf() function could use this flaw to crash that application or, potentially, execute arbitrary code with the permissions of the user running the application. (CVE-2015-1473) A heap-based buffer overflow flaw was found in glibc's swscanf() function. An attacker able to make an application call the swscanf() function could use this flaw to crash that application or, potentially, execute arbitrary code with the permissions of the user running the application. (CVE-2015-1472)
    last seen 2019-02-21
    modified 2018-04-18
    plugin id 87343
    published 2015-12-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=87343
    title Amazon Linux AMI : glibc (ALAS-2015-617)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2015-2199.NASL
    description Updated glibc packages that fix multiple security issues, several bugs, and add one enhancement are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the Name Server Caching Daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. It was discovered that, under certain circumstances, glibc's getaddrinfo() function would send DNS queries to random file descriptors. An attacker could potentially use this flaw to send DNS queries to unintended recipients, resulting in information disclosure or data loss due to the application encountering corrupted data. (CVE-2013-7423) A buffer overflow flaw was found in the way glibc's gethostbyname_r() and other related functions computed the size of a buffer when passed a misaligned buffer as input. An attacker able to make an application call any of these functions with a misaligned buffer could use this flaw to crash the application or, potentially, execute arbitrary code with the permissions of the user running the application. (CVE-2015-1781) A heap-based buffer overflow flaw and a stack overflow flaw were found in glibc's swscanf() function. An attacker able to make an application call the swscanf() function could use these flaws to crash that application or, potentially, execute arbitrary code with the permissions of the user running the application. (CVE-2015-1472, CVE-2015-1473) An integer overflow flaw, leading to a heap-based buffer overflow, was found in glibc's _IO_wstr_overflow() function. An attacker able to make an application call this function could use this flaw to crash that application or, potentially, execute arbitrary code with the permissions of the user running the application. (BZ#1195762) A flaw was found in the way glibc's fnmatch() function processed certain malformed patterns. An attacker able to make an application call this function could use this flaw to crash that application. (BZ#1197730) The CVE-2015-1781 issue was discovered by Arjun Shankar of Red Hat. These updated glibc packages also include numerous bug fixes and one enhancement. Space precludes documenting all of these changes in this advisory. For information on the most significant of these changes, users are directed to the following article on the Red Hat Customer Portal : https://access.redhat.com/articles/2050743 All glibc users are advised to upgrade to these updated packages, which contain backported patches to correct these issues and add these enhancements.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 87142
    published 2015-12-02
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=87142
    title CentOS 7 : glibc (CESA-2015:2199)
  • NASL family Mandriva Local Security Checks
    NASL id MANDRIVA_MDVSA-2015-218.NASL
    description Multiple vulnerabilities has been found and corrected in glibc : It was discovered that, under certain circumstances, glibc's getaddrinfo\(\) function would send DNS queries to random file descriptors. An attacker could potentially use this flaw to send DNS queries to unintended recipients, resulting in information disclosure or data loss due to the application encountering corrupted data (CVE-2013-7423). A buffer overflow flaw was found in the way glibc's gethostbyname_r\(\) and other related functions computed the size of a buffer when passed a misaligned buffer as input. An attacker able to make an application call any of these functions with a misaligned buffer could use this flaw to crash the application or, potentially, execute arbitrary code with the permissions of the user running the application (CVE-2015-1781). The updated packages provides a solution for these security issues.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 83170
    published 2015-05-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=83170
    title Mandriva Linux Security Advisory : glibc (MDVSA-2015:218)
  • NASL family Amazon Linux Local Security Checks
    NASL id ALA_ALAS-2015-513.NASL
    description A buffer overflow flaw was found in the way glibc's gethostbyname_r() and other related functions computed the size of a buffer when passed a misaligned buffer as input. An attacker able to make an application call any of these functions with a misaligned buffer could use this flaw to crash the application or, potentially, execute arbitrary code with the permissions of the user running the application. (CVE-2015-1781) It was discovered that, under certain circumstances, glibc's getaddrinfo() function would send DNS queries to random file descriptors. An attacker could potentially use this flaw to send DNS queries to unintended recipients, resulting in information disclosure or data loss due to the application encountering corrupted data. (CVE-2013-7423)
    last seen 2019-02-21
    modified 2018-04-18
    plugin id 83056
    published 2015-04-27
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=83056
    title Amazon Linux AMI : glibc (ALAS-2015-513)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2015-173.NASL
    description Glibc was updated to fix several security issues. - Avoid infinite loop in nss_dns getnetbyname (CVE-2014-9402, bsc#910599, BZ #17630) - wordexp fails to honour WRDE_NOCMD (CVE-2014-7817, bsc#906371, BZ #17625) - Fix invalid file descriptor reuse while sending DNS query (CVE-2013-7423, bsc#915526, BZ #15946) - Fix buffer overflow in wscanf (CVE-2015-1472, bsc#916222, BZ #16618)
    last seen 2019-02-21
    modified 2016-02-28
    plugin id 81560
    published 2015-02-27
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=81560
    title openSUSE Security Update : glibc (openSUSE-2015-173)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2015-0863.NASL
    description From Red Hat Security Advisory 2015:0863 : Updated glibc packages that fix two security issues and one bug are now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the Name Server Caching Daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. A buffer overflow flaw was found in the way glibc's gethostbyname_r() and other related functions computed the size of a buffer when passed a misaligned buffer as input. An attacker able to make an application call any of these functions with a misaligned buffer could use this flaw to crash the application or, potentially, execute arbitrary code with the permissions of the user running the application. (CVE-2015-1781) It was discovered that, under certain circumstances, glibc's getaddrinfo() function would send DNS queries to random file descriptors. An attacker could potentially use this flaw to send DNS queries to unintended recipients, resulting in information disclosure or data loss due to the application encountering corrupted data. (CVE-2013-7423) The CVE-2015-1781 issue was discovered by Arjun Shankar of Red Hat. This update also fixes the following bug : * Previously, the nscd daemon did not properly reload modified data when the user edited monitored nscd configuration files. As a consequence, nscd returned stale data to system processes. This update adds a system of inotify-based monitoring and stat-based backup monitoring for nscd configuration files. As a result, nscd now detects changes to its configuration files and reloads the data properly, which prevents it from returning stale data. (BZ#1194149) All glibc users are advised to upgrade to these updated packages, which contain backported patches to correct these issues.
    last seen 2019-02-21
    modified 2018-07-18
    plugin id 82980
    published 2015-04-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=82980
    title Oracle Linux 6 : glibc (ELSA-2015-0863)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20150421_GLIBC_ON_SL6_X.NASL
    description A buffer overflow flaw was found in the way glibc's gethostbyname_r() and other related functions computed the size of a buffer when passed a misaligned buffer as input. An attacker able to make an application call any of these functions with a misaligned buffer could use this flaw to crash the application or, potentially, execute arbitrary code with the permissions of the user running the application. (CVE-2015-1781) It was discovered that, under certain circumstances, glibc's getaddrinfo() function would send DNS queries to random file descriptors. An attacker could potentially use this flaw to send DNS queries to unintended recipients, resulting in information disclosure or data loss due to the application encountering corrupted data. (CVE-2013-7423) This update also fixes the following bug : - Previously, the nscd daemon did not properly reload modified data when the user edited monitored nscd configuration files. As a consequence, nscd returned stale data to system processes. This update adds a system of inotify-based monitoring and stat-based backup monitoring for nscd configuration files. As a result, nscd now detects changes to its configuration files and reloads the data properly, which prevents it from returning stale data.
    last seen 2019-02-21
    modified 2018-12-28
    plugin id 82987
    published 2015-04-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=82987
    title Scientific Linux Security Update : glibc on SL6.x i386/x86_64
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DLA-165.NASL
    description Several vulnerabilities have been fixed in eglibc, Debian's version of the GNU C library. #553206 CVE-2015-1472 CVE-2015-1473 The scanf family of functions do not properly limit stack allocation, which allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code. CVE-2012-3405 The printf family of functions do not properly calculate a buffer length, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a denial of service. CVE-2012-3406 The printf family of functions do not properly limit stack allocation, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a denial of service (crash) or possibly execute arbitrary code via a crafted format string. CVE-2012-3480 Multiple integer overflows in the strtod, strtof, strtold, strtod_l, and other related functions allow local users to cause a denial of service (application crash) and possibly execute arbitrary code via a long string, which triggers a stack-based buffer overflow. CVE-2012-4412 Integer overflow in the strcoll and wcscoll functions allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string, which triggers a heap-based buffer overflow. CVE-2012-4424 Stack-based buffer overflow in the strcoll and wcscoll functions allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string that triggers a malloc failure and use of the alloca function. CVE-2013-0242 Buffer overflow in the extend_buffers function in the regular expression matcher allows context-dependent attackers to cause a denial of service (memory corruption and crash) via crafted multibyte characters. CVE-2013-1914 CVE-2013-4458 Stack-based buffer overflow in the getaddrinfo function allows remote attackers to cause a denial of service (crash) via a hostname or IP address that triggers a large number of domain conversion results. CVE-2013-4237 readdir_r allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a malicious NTFS image or CIFS service. CVE-2013-4332 Multiple integer overflows in malloc/malloc.c allow context-dependent attackers to cause a denial of service (heap corruption) via a large value to the pvalloc, valloc, posix_memalign, memalign, or aligned_alloc functions. CVE-2013-4357 The getaliasbyname, getaliasbyname_r, getaddrinfo, getservbyname, getservbyname_r, getservbyport, getservbyport_r, and glob functions do not properly limit stack allocation, which allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code. CVE-2013-4788 When the GNU C library is statically linked into an executable, the PTR_MANGLE implementation does not initialize the random value for the pointer guard, so that various hardening mechanisms are not effective. CVE-2013-7423 The send_dg function in resolv/res_send.c does not properly reuse file descriptors, which allows remote attackers to send DNS queries to unintended locations via a large number of requests that trigger a call to the getaddrinfo function. CVE-2013-7424 The getaddrinfo function may attempt to free an invalid pointer when handling IDNs (Internationalised Domain Names), which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code. CVE-2014-4043 The posix_spawn_file_actions_addopen function does not copy its path argument in accordance with the POSIX specification, which allows context-dependent attackers to trigger use-after-free vulnerabilities. For the oldstable distribution (squeeze), these problems have been fixed in version 2.11.3-4+deb6u5. For the stable distribution (wheezy), these problems were fixed in version 2.13-38+deb7u8 or earlier. NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-07-06
    plugin id 82149
    published 2015-03-26
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=82149
    title Debian DLA-165-1 : eglibc security update
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20151119_GLIBC_ON_SL7_X.NASL
    description It was discovered that, under certain circumstances, glibc's getaddrinfo() function would send DNS queries to random file descriptors. An attacker could potentially use this flaw to send DNS queries to unintended recipients, resulting in information disclosure or data loss due to the application encountering corrupted data. (CVE-2013-7423) A buffer overflow flaw was found in the way glibc's gethostbyname_r() and other related functions computed the size of a buffer when passed a misaligned buffer as input. An attacker able to make an application call any of these functions with a misaligned buffer could use this flaw to crash the application or, potentially, execute arbitrary code with the permissions of the user running the application. (CVE-2015-1781) A heap-based buffer overflow flaw and a stack overflow flaw were found in glibc's swscanf() function. An attacker able to make an application call the swscanf() function could use these flaws to crash that application or, potentially, execute arbitrary code with the permissions of the user running the application. (CVE-2015-1472, CVE-2015-1473) An integer overflow flaw, leading to a heap-based buffer overflow, was found in glibc's _IO_wstr_overflow() function. An attacker able to make an application call this function could use this flaw to crash that application or, potentially, execute arbitrary code with the permissions of the user running the application. A flaw was found in the way glibc's fnmatch() function processed certain malformed patterns. An attacker able to make an application call this function could use this flaw to crash that application.
    last seen 2019-02-21
    modified 2018-12-28
    plugin id 87556
    published 2015-12-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=87556
    title Scientific Linux Security Update : glibc on SL7.x x86_64
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2015-0551-1.NASL
    description glibc has been updated to fix four security issues : - CVE-2014-0475: Directory traversal in locale environment handling (bnc#887022) - CVE-2014-7817: wordexp failed to honour WRDE_NOCMD (bsc#906371) - CVE-2014-9402: Avoid infinite loop in nss_dns getnetbyname (bsc#910599) - CVE-2015-1472: Fixed buffer overflow in wscanf (bsc#916222) - CVE-2013-7423: getaddrinfo() wrote DNS queries to random file descriptors under high load. (bnc#915526) The update package also includes non-security fixes. See advisory for details. Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-29
    plugin id 83705
    published 2015-05-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=83705
    title SUSE SLES11 Security Update : glibc (SUSE-SU-2015:0551-1)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2015-2199.NASL
    description Updated glibc packages that fix multiple security issues, several bugs, and add one enhancement are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the Name Server Caching Daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. It was discovered that, under certain circumstances, glibc's getaddrinfo() function would send DNS queries to random file descriptors. An attacker could potentially use this flaw to send DNS queries to unintended recipients, resulting in information disclosure or data loss due to the application encountering corrupted data. (CVE-2013-7423) A buffer overflow flaw was found in the way glibc's gethostbyname_r() and other related functions computed the size of a buffer when passed a misaligned buffer as input. An attacker able to make an application call any of these functions with a misaligned buffer could use this flaw to crash the application or, potentially, execute arbitrary code with the permissions of the user running the application. (CVE-2015-1781) A heap-based buffer overflow flaw and a stack overflow flaw were found in glibc's swscanf() function. An attacker able to make an application call the swscanf() function could use these flaws to crash that application or, potentially, execute arbitrary code with the permissions of the user running the application. (CVE-2015-1472, CVE-2015-1473) An integer overflow flaw, leading to a heap-based buffer overflow, was found in glibc's _IO_wstr_overflow() function. An attacker able to make an application call this function could use this flaw to crash that application or, potentially, execute arbitrary code with the permissions of the user running the application. (BZ#1195762) A flaw was found in the way glibc's fnmatch() function processed certain malformed patterns. An attacker able to make an application call this function could use this flaw to crash that application. (BZ#1197730) The CVE-2015-1781 issue was discovered by Arjun Shankar of Red Hat. These updated glibc packages also include numerous bug fixes and one enhancement. Space precludes documenting all of these changes in this advisory. For information on the most significant of these changes, users are directed to the following article on the Red Hat Customer Portal : https://access.redhat.com/articles/2050743 All glibc users are advised to upgrade to these updated packages, which contain backported patches to correct these issues and add these enhancements.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 86937
    published 2015-11-19
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=86937
    title RHEL 7 : glibc (RHSA-2015:2199)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2015-2199.NASL
    description From Red Hat Security Advisory 2015:2199 : Updated glibc packages that fix multiple security issues, several bugs, and add one enhancement are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the Name Server Caching Daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. It was discovered that, under certain circumstances, glibc's getaddrinfo() function would send DNS queries to random file descriptors. An attacker could potentially use this flaw to send DNS queries to unintended recipients, resulting in information disclosure or data loss due to the application encountering corrupted data. (CVE-2013-7423) A buffer overflow flaw was found in the way glibc's gethostbyname_r() and other related functions computed the size of a buffer when passed a misaligned buffer as input. An attacker able to make an application call any of these functions with a misaligned buffer could use this flaw to crash the application or, potentially, execute arbitrary code with the permissions of the user running the application. (CVE-2015-1781) A heap-based buffer overflow flaw and a stack overflow flaw were found in glibc's swscanf() function. An attacker able to make an application call the swscanf() function could use these flaws to crash that application or, potentially, execute arbitrary code with the permissions of the user running the application. (CVE-2015-1472, CVE-2015-1473) An integer overflow flaw, leading to a heap-based buffer overflow, was found in glibc's _IO_wstr_overflow() function. An attacker able to make an application call this function could use this flaw to crash that application or, potentially, execute arbitrary code with the permissions of the user running the application. (BZ#1195762) A flaw was found in the way glibc's fnmatch() function processed certain malformed patterns. An attacker able to make an application call this function could use this flaw to crash that application. (BZ#1197730) The CVE-2015-1781 issue was discovered by Arjun Shankar of Red Hat. These updated glibc packages also include numerous bug fixes and one enhancement. Space precludes documenting all of these changes in this advisory. For information on the most significant of these changes, users are directed to the following article on the Red Hat Customer Portal : https://access.redhat.com/articles/2050743 All glibc users are advised to upgrade to these updated packages, which contain backported patches to correct these issues and add these enhancements.
    last seen 2019-02-21
    modified 2018-07-24
    plugin id 87092
    published 2015-11-30
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=87092
    title Oracle Linux 7 : glibc (ELSA-2015-2199)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2015-0863.NASL
    description Updated glibc packages that fix two security issues and one bug are now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the Name Server Caching Daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. A buffer overflow flaw was found in the way glibc's gethostbyname_r() and other related functions computed the size of a buffer when passed a misaligned buffer as input. An attacker able to make an application call any of these functions with a misaligned buffer could use this flaw to crash the application or, potentially, execute arbitrary code with the permissions of the user running the application. (CVE-2015-1781) It was discovered that, under certain circumstances, glibc's getaddrinfo() function would send DNS queries to random file descriptors. An attacker could potentially use this flaw to send DNS queries to unintended recipients, resulting in information disclosure or data loss due to the application encountering corrupted data. (CVE-2013-7423) The CVE-2015-1781 issue was discovered by Arjun Shankar of Red Hat. This update also fixes the following bug : * Previously, the nscd daemon did not properly reload modified data when the user edited monitored nscd configuration files. As a consequence, nscd returned stale data to system processes. This update adds a system of inotify-based monitoring and stat-based backup monitoring for nscd configuration files. As a result, nscd now detects changes to its configuration files and reloads the data properly, which prevents it from returning stale data. (BZ#1194149) All glibc users are advised to upgrade to these updated packages, which contain backported patches to correct these issues.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 82984
    published 2015-04-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=82984
    title RHEL 6 : glibc (RHSA-2015:0863)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2015-0863.NASL
    description Updated glibc packages that fix two security issues and one bug are now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the Name Server Caching Daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. A buffer overflow flaw was found in the way glibc's gethostbyname_r() and other related functions computed the size of a buffer when passed a misaligned buffer as input. An attacker able to make an application call any of these functions with a misaligned buffer could use this flaw to crash the application or, potentially, execute arbitrary code with the permissions of the user running the application. (CVE-2015-1781) It was discovered that, under certain circumstances, glibc's getaddrinfo() function would send DNS queries to random file descriptors. An attacker could potentially use this flaw to send DNS queries to unintended recipients, resulting in information disclosure or data loss due to the application encountering corrupted data. (CVE-2013-7423) The CVE-2015-1781 issue was discovered by Arjun Shankar of Red Hat. This update also fixes the following bug : * Previously, the nscd daemon did not properly reload modified data when the user edited monitored nscd configuration files. As a consequence, nscd returned stale data to system processes. This update adds a system of inotify-based monitoring and stat-based backup monitoring for nscd configuration files. As a result, nscd now detects changes to its configuration files and reloads the data properly, which prevents it from returning stale data. (BZ#1194149) All glibc users are advised to upgrade to these updated packages, which contain backported patches to correct these issues.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 82928
    published 2015-04-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=82928
    title CentOS 6 : glibc (CESA-2015:0863)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2015-0550-1.NASL
    description glibc has been updated to fix four security issues : - CVE-2014-0475: Directory traversal in locale environment handling (bnc#887022) - CVE-2014-7817: wordexp failed to honour WRDE_NOCMD (bsc#906371) - CVE-2014-9402: Avoid infinite loop in nss_dns getnetbyname (bsc#910599) - CVE-2015-1472: Fixed buffer overflow in wscanf (bsc#916222) This non-security issue has been fixed : - Fix missing zero termination (bnc#918233) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-29
    plugin id 83704
    published 2015-05-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=83704
    title SUSE SLES10 Security Update : glibc (SUSE-SU-2015:0550-1)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2015-0526-1.NASL
    description glibc has been updated to fix four security issues. These security issues were fixed : - CVE-2014-7817: The wordexp function in GNU C Library (aka glibc) 2.21 did not enforce the WRDE_NOCMD flag, which allowed context-dependent attackers to execute arbitrary commands, as demonstrated by input containing '$((`...`))' (bnc#906371). - CVE-2015-1472: Heap buffer overflow in glibc swscanf (bnc#916222). - CVE-2014-9402: Denial of service in getnetbyname function (bnc#910599). - CVE-2013-7423: Getaddrinfo() writes DNS queries to random file descriptors under high load (bnc#915526). The update package also includes non-security fixes. See advisory for details. Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-29
    plugin id 83701
    published 2015-05-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=83701
    title SUSE SLED12 / SLES12 Security Update : glibc (SUSE-SU-2015:0526-1)
redhat via4
advisories
  • rhsa
    id RHSA-2015:0863
  • rhsa
    id RHSA-2016:1207
rpms
  • glibc-0:2.12-1.149.el6_6.7
  • glibc-common-0:2.12-1.149.el6_6.7
  • glibc-devel-0:2.12-1.149.el6_6.7
  • glibc-headers-0:2.12-1.149.el6_6.7
  • glibc-static-0:2.12-1.149.el6_6.7
  • glibc-utils-0:2.12-1.149.el6_6.7
  • nscd-0:2.12-1.149.el6_6.7
  • glibc-0:2.17-105.el7
  • glibc-common-0:2.17-105.el7
  • glibc-devel-0:2.17-105.el7
  • glibc-headers-0:2.17-105.el7
  • glibc-static-0:2.17-105.el7
  • glibc-utils-0:2.17-105.el7
  • nscd-0:2.17-105.el7
refmap via4
bid 72844
confirm
gentoo GLSA-201602-02
mlist [oss-security] 20150128 Re: the other glibc issue
suse openSUSE-SU-2015:0351
ubuntu USN-2519-1
Last major update 20-07-2016 - 13:37
Published 24-02-2015 - 10:59
Last modified 30-10-2018 - 12:27
Back to Top