First published: Wed Jun 01 2016(Updated: )
Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Linux | =13.2 | |
GNU C Library (glibc) | <=2.23 | |
Fedora | =23 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =15.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3075 has a severity rating that allows for denial of service attacks through a stack-based buffer overflow.
To fix CVE-2016-3075, update the GNU C Library (glibc) to version 2.24 or later on affected systems.
CVE-2016-3075 affects systems running glibc prior to version 2.24, including specific versions of openSUSE, Fedora, and Ubuntu.
CVE-2016-3075 is caused by a stack-based buffer overflow in the nss_dns implementation of the getnetbyname function.
The potential impact of CVE-2016-3075 includes stack consumption and application crashes, leading to denial of service.