First published: Tue Nov 18 2014(Updated: )
DB_LOOKUP in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) 2.21 and earlier does not properly check if a file is open, which allows remote attackers to cause a denial of service (infinite loop) by performing a look-up on a database while iterating over it, which triggers the file pointer to be reset.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Linux Enterprise Desktop | =11-sp3 | |
SUSE Linux Enterprise Desktop | =11-sp4 | |
SUSE Linux Enterprise Server | =11.0-sp3 | |
SUSE Linux Enterprise Server | =11.0-sp3 | |
SUSE Linux Enterprise Server | =11.0-sp4 | |
GNU C Library (glibc) | <=2.21 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =15.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8121 has a medium severity level as it can lead to a denial of service due to an infinite loop.
To mitigate CVE-2014-8121, update glibc to version 2.22 or later, or apply patches provided by your Linux distribution.
CVE-2014-8121 affects several versions of SUSE Linux Enterprise Desktop, SUSE Linux Enterprise Server, and Ubuntu Linux up to version 15.10.
Yes, CVE-2014-8121 can be exploited remotely by attackers performing a look-up on the affected database.
Exploiting CVE-2014-8121 can cause a denial of service by triggering an infinite loop in the affected Name Service Switch.