Gnu c Library DoS Vulnerability (CVE-2016-3075)
Gnu c Library DoS Vulnerability (CVE-2016-3075)
Release date:
Updated on:
Affected Systems:
Gnu c Library (glibc) <2.24
Description:
CVE (CAN) ID: CVE-2016-3075
Glibc is the libc library released by GNU, that is, the c Runtime Library.
In versions earlier than gnu c Library (glibc) 2.24, The getnetbyname function of nss_dns has the stack buffer overflow vulnerability. Attackers with independent context can use long names to cause DoS attacks.
<* Source: Florian Weimer
*>
Suggestion:
Vendor patch:
GNU
---
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Https://sourceware.org/git/gitweb.cgi? P = glibc. git; h = 317b199b4aff8cfa27f2302ab404d2bb5032b9a4
Https://sourceware.org/bugzilla/show_bug.cgi? Id = 19879
Upgrade Glibc in Linux
Dangerous! GHOST (GHOST) vulnerability exposure
GNU glibc gethostbyname Buffer Overflow Vulnerability
Glibc gethostbyname Buffer Overflow Vulnerability (CVE-2015-0235)
Linux glibc ghost vulnerability test and repair methods