Lucene search

K
freebsdFreeBSD0765DE84-A6C1-11E4-A0C1-C485083CA99C
HistoryJan 27, 2015 - 12:00 a.m.

glibc -- gethostbyname buffer overflow

2015-01-2700:00:00
vuxml.freebsd.org
121

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.975 High

EPSS

Percentile

100.0%

Robert Krátký reports:

    GHOST is a 'buffer overflow' bug affecting the gethostbyname() and
    gethostbyname2() function calls in the glibc library. This
    vulnerability allows a remote attacker that is able to make an
    application call to either of these functions to execute arbitrary
    code with the permissions of the user running the application.
    The gethostbyname() function calls are used for DNS resolving, which
    is a very common event. To exploit this vulnerability, an attacker
    must trigger a buffer overflow by supplying an invalid hostname
    argument to an application that performs a DNS resolution.