Buffer Overflow in GNU C Library Affecting Various Linux Distributions
CVE-2015-1781
Currently unrated
Key Information:
- Vendor
- Suse
- Vendor
- CVE Published:
- 28 September 2015
Summary
A vulnerability in the GNU C Library allows context-dependent attackers to exploit a buffer overflow during the processing of DNS responses. This exploitation may lead to unintended denial of service conditions, including application crashes, or may grant the ability to execute arbitrary code on affected systems. The vulnerability arises due to misalignment in the buffer handling when invoking the gethostbyname_r and other NSS functions, particularly with crafted DNS responses. Systems using glibc versions prior to 2.22 are particularly susceptible, impacting various Linux distributions and applications relying on this library.
References
EPSS Score
7% chance of being exploited in the next 30 days.
Timeline
Vulnerability published
Vulnerability Reserved