First published: Wed Apr 03 2013(Updated: )
A stack (frame) overflow flaw, leading to denial of service (application crash), was found in the way getaddrinfo() routine (returning a list of address structures for particular request) of glibc, the collection of GNU libc libraries, processed certain requests. If an application linked against glibc accepted untrusted getaddrinfo() input remotely, a remote attacker could issue a specially-crafted request, which once processed would lead to that application crash. References: [1] <a href="https://bugzilla.novell.com/show_bug.cgi?id=813121">https://bugzilla.novell.com/show_bug.cgi?id=813121</a> [2] <a href="http://www.openwall.com/lists/oss-security/2013/04/03/2">http://www.openwall.com/lists/oss-security/2013/04/03/2</a> Proposed Novell patch: [3] <a href="http://bugzillafiles.novell.org/attachment.cgi?id=533210">http://bugzillafiles.novell.org/attachment.cgi?id=533210</a>
Affected Software | Affected Version | How to fix |
---|---|---|
GNU C Library (glibc) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-947882 is considered high due to the potential for denial of service resulting from stack overflow.
To fix REDHAT-BUG-947882, update the GNU glibc to the latest patched version provided by your distribution.
Applications that are linked against the affected versions of GNU glibc are vulnerable to REDHAT-BUG-947882.
REDHAT-BUG-947882 is a stack frame overflow vulnerability in the getaddrinfo() routine of glibc, leading to application crashes.
REDHAT-BUG-947882 was reported and documented in April 2013.