First published: Mon Aug 03 2015(Updated: )
It was discovered that the glibc DNS resolver dereferenced a NULL pointer when processing a specific, but valid resource record type. Acknowledgements: Name: Florian Weimer (Red Hat Product Security)
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
GNU C Library | <=2.24 | |
debian/glibc | 2.31-13+deb11u11 2.31-13+deb11u10 2.36-9+deb12u9 2.36-9+deb12u7 2.40-7 2.41-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5180 is classified as a medium severity vulnerability.
To fix CVE-2015-5180, update glibc to versions above 2.24, specifically to 2.31-13+deb11u10 or later.
CVE-2015-5180 can be exploited by remote attackers through specially crafted DNS responses.
CVE-2015-5180 affects Ubuntu Linux versions 12.04, 14.04, 16.04 and GNU C Library (glibc) versions up to 2.24.
CVE-2015-5180 involves the res_query function in the libresolv library of glibc.