First published: Wed Dec 17 2014(Updated: )
The nss_dns implementation of getnetbyname in GNU C Library (aka glibc) before 2.21, when the DNS backend in the Name Service Switch configuration is enabled, allows remote attackers to cause a denial of service (infinite loop) by sending a positive answer while a network name is being process.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
GNU C Library (glibc) | <=2.20 | |
Ubuntu Linux | =10.04 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =14.10 | |
openSUSE | =13.1 | |
openSUSE | =13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9402 has a high severity rating due to its potential to cause a denial of service.
To mitigate CVE-2014-9402, upgrade to glibc version 2.21 or later.
CVE-2014-9402 affects glibc versions prior to 2.21.
Systems such as Ubuntu Linux 10.04, 12.04, 14.04, 14.10, and openSUSE 13.1 and 13.2 are impacted by CVE-2014-9402.
Yes, CVE-2014-9402 can be exploited remotely by attackers through DNS responses.