Lucene search

K
debianDebianDEBIAN:DLA-494-1:C3160
HistoryMay 30, 2016 - 4:24 a.m.

[SECURITY] [DLA 494-1] eglibc security update

2016-05-3004:24:49
lists.debian.org
25

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.013 Low

EPSS

Percentile

85.9%

Package : eglibc
Version : 2.13-38+deb7u11
CVE ID : CVE-2016-1234 CVE-2016-3075 CVE-2016-3706

Several vulnerabilities have been fixed in the Debian GNU C Library,
eglibc:

CVE-2016-1234

Alexander Cherepanov discovered that the glibc's glob implementation
suffered from a stack-based buffer overflow when it was called with the
GLOB_ALTDIRFUNC flag and encountered a long file name.

CVE-2016-3075

The getnetbyname implementation in nss_dns was susceptible to a stack
overflow and a crash if it was invoked on a very long name.

CVE-2016-3706

Michael Petlan reported that getaddrinfo copied large amounts of address
data to the stack, possibly leading to a stack overflow. This complements
the fix for CVE-2013-4458.

For Debian 7 "Wheezy", these problems have been fixed in version
2.13-38+deb7u11.

We recommend you to upgrade your eglibc packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system, and frequently asked questions can be
found at: https://wiki.debian.org/LTS
Attachment:
signature.asc
Description: PGP signature

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.013 Low

EPSS

Percentile

85.9%