First published: Fri Jun 10 2016(Updated: )
Last updated 24 July 2024
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | ||
SUSE Linux | =13.2 | |
GNU C Library (glibc) | <2.23 | |
debian/glibc | 2.31-13+deb11u11 2.31-13+deb11u10 2.36-9+deb12u9 2.36-9+deb12u7 2.40-7 2.41-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3706 is classified as a critical vulnerability due to its potential to cause denial of service.
To fix CVE-2016-3706, update the affected GNU C Library (glibc) to version 2.31-13+deb11u11 or newer.
CVE-2016-3706 affects GNU C Library versions up to 2.23, as well as specific versions of Android and openSUSE 13.2.
CVE-2016-3706 is a stack-based buffer overflow vulnerability occurring in the getaddrinfo function.
Yes, CVE-2016-3706 can be exploited remotely, leading to service disruption by crashing applications using the vulnerable function.