9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.043 Low
EPSS
Percentile
92.2%
Package : eglibc
Version : eglibc_2.11.3-4+deb6u9
CVE ID : CVE-2014-9761 CVE-2015-8776 CVE-2015-8778 CVE-2015-8779
Several vulnerabilities have been fixed in the Debian GNU C Library,
eglibc:
CVE-2014-9761
The math's nan* function wrongly handled payload strings, yielding
to an unbounded stack allocation based on the length of the
arguments. To solve this issue, payload parsing has been refactored
out of strtod into a separate functions that nan* can call directly.
CVE-2015-8776
The strftime() function made it possible to access invalid memory,
allowing to segfault the calling application.
CVE-2015-8778
hcreate() was susceptible to an integer overflow, that may results
in out-of-bounds heap accesses.
CVE-2015-8779
The catopen() function suffered from multiple unbounded stack
allocations.
For Debian 6 "Squeeze", these issues have been fixed in eglibc version
eglibc_2.11.3-4+deb6u9. We recommend you to upgrade your eglibc
packages.
Learn more about the Debian Long Term Support (LTS) Project and how to
apply these updates at: https://wiki.debian.org/LTS/
Attachment:
signature.asc
Description: PGP signature
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 8 | kfreebsd-i386 | locales-all | < 2.19-18+deb8u3 | locales-all_2.19-18+deb8u3_kfreebsd-i386.deb |
Debian | 7 | amd64 | libnss-files-udeb | < 2.13-38+deb7u10 | libnss-files-udeb_2.13-38+deb7u10_amd64.deb |
Debian | 8 | arm64 | libc6-dev | < 2.19-18+deb8u3 | libc6-dev_2.19-18+deb8u3_arm64.deb |
Debian | 7 | amd64 | libc6-prof | < 2.13-38+deb7u10 | libc6-prof_2.13-38+deb7u10_amd64.deb |
Debian | 7 | sparc | libc-dev-bin | < 2.13-38+deb7u10 | libc-dev-bin_2.13-38+deb7u10_sparc.deb |
Debian | 7 | ia64 | libc6.1-dev | < 2.13-38+deb7u10 | libc6.1-dev_2.13-38+deb7u10_ia64.deb |
Debian | 8 | ppc64el | libc6-pic | < 2.19-18+deb8u3 | libc6-pic_2.19-18+deb8u3_ppc64el.deb |
Debian | 7 | i386 | libc6-xen | < 2.13-38+deb7u10 | libc6-xen_2.13-38+deb7u10_i386.deb |
Debian | 7 | mips | locales-all | < 2.13-38+deb7u10 | locales-all_2.13-38+deb7u10_mips.deb |
Debian | 8 | mipsel | libc6-dev-mips64 | < 2.19-18+deb8u3 | libc6-dev-mips64_2.19-18+deb8u3_mipsel.deb |
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.043 Low
EPSS
Percentile
92.2%