First published: Wed Apr 03 2013(Updated: )
A stack (frame) overflow flaw, leading to denial of service (application crash), was found in the way getaddrinfo() routine (returning a list of address structures for particular request) of glibc, the collection of GNU libc libraries, processed certain requests. If an application linked against glibc accepted untrusted getaddrinfo() input remotely, a remote attacker could issue a specially-crafted request, which once processed would lead to that application crash. References: [1] <a href="https://bugzilla.novell.com/show_bug.cgi?id=813121">https://bugzilla.novell.com/show_bug.cgi?id=813121</a> [2] <a href="http://www.openwall.com/lists/oss-security/2013/04/03/2">http://www.openwall.com/lists/oss-security/2013/04/03/2</a> Proposed Novell patch: [3] <a href="http://bugzillafiles.novell.org/attachment.cgi?id=533210">http://bugzillafiles.novell.org/attachment.cgi?id=533210</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
GNU glibc | <=2.17 | |
GNU glibc | =2.0.1 | |
GNU glibc | =2.0.6 | |
GNU glibc | =2.2 | |
GNU glibc | =2.2.1 | |
GNU glibc | =2.2.2 | |
GNU glibc | =2.2.3 | |
GNU glibc | =2.2.4 | |
GNU glibc | =2.2.5 | |
GNU glibc | =2.3 | |
GNU glibc | =2.3.1 | |
GNU glibc | =2.3.2 | |
GNU glibc | =2.3.3 | |
GNU glibc | =2.3.4 | |
GNU glibc | =2.3.5 | |
GNU glibc | =2.3.6 | |
GNU glibc | =2.4 | |
GNU glibc | =2.5 | |
GNU glibc | =2.5.1 | |
GNU glibc | =2.6 | |
GNU glibc | =2.6.1 | |
GNU glibc | =2.7 | |
GNU glibc | =2.8 | |
GNU glibc | =2.9 | |
GNU glibc | =2.10.1 | |
GNU glibc | =2.11 | |
GNU glibc | =2.11.1 | |
GNU glibc | =2.11.2 | |
GNU glibc | =2.11.3 | |
GNU glibc | =2.12.1 | |
GNU glibc | =2.12.2 | |
GNU glibc | =2.13 | |
GNU glibc | =2.14 | |
GNU glibc | =2.14.1 | |
GNU glibc | =2.15 | |
GNU glibc | =2.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.