First published: Mon Sep 28 2015(Updated: )
Buffer overflow in the gethostbyname_r and other unspecified NSS functions in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response, which triggers a call with a misaligned buffer.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Linux Enterprise Debuginfo | =11-sp3 | |
SUSE Linux Enterprise Debuginfo | =11-sp4 | |
SUSE Linux Enterprise Desktop | =11-sp3 | |
SUSE Linux Enterprise Desktop | =11-sp4 | |
SUSE Linux Enterprise Server | =11-sp3 | |
SUSE Linux Enterprise Server | =11-sp3 | |
SUSE Linux Enterprise Server | =11-sp4 | |
GNU C Library (glibc) | <=2.21 | |
Debian | =7.0 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =15.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1781 has a severity rating of high due to its potential for denial of service or arbitrary code execution.
To mitigate CVE-2015-1781, upgrade to glibc version 2.22 or later on affected systems.
CVE-2015-1781 affects various versions of SUSE Linux, Debian 7.0, and Ubuntu releases prior to their respective patched versions.
Yes, attackers can exploit CVE-2015-1781 remotely via crafted DNS responses.
CVE-2015-1781 can result in a denial of service or allow attackers to execute arbitrary code on the affected system.