First published: Tue Aug 01 2017(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/glibc | <2.26 | 2.26 |
GNU C Library (glibc) | <=2.25 | |
debian/glibc | 2.31-13+deb11u11 2.31-13+deb11u10 2.36-9+deb12u9 2.36-9+deb12u7 2.40-7 2.41-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12132 is classified as having high severity due to its potential to facilitate DNS spoofing attacks.
To fix CVE-2017-12132, upgrade the GNU C Library to version 2.26 or higher.
CVE-2017-12132 affects versions of the GNU C Library before 2.26 and specifically those with EDNS support enabled.
Yes, CVE-2017-12132 could potentially lead to data breaches through successful off-path DNS spoofing.
CVE-2017-12132 remains a concern for systems using outdated versions of glibc prior to 2.26 that have not been patched.