9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.5 High
AI Score
Confidence
High
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.123 Low
EPSS
Percentile
95.3%
Martin Carpenter discovered that pt_chown in the GNU C Library did not
properly check permissions for tty files. A local attacker could use this
to gain administrative privileges or expose sensitive information.
(CVE-2013-2207, CVE-2016-2856)
Robin Hack discovered that the Name Service Switch (NSS) implementation in
the GNU C Library did not properly manage its file descriptors. An attacker
could use this to cause a denial of service (infinite loop).
(CVE-2014-8121)
Joseph Myers discovered that the GNU C Library did not properly handle long
arguments to functions returning a representation of Not a Number (NaN). An
attacker could use this to cause a denial of service (stack exhaustion
leading to an application crash) or possibly execute arbitrary code.
(CVE-2014-9761)
Arjun Shankar discovered that in certain situations the nss_dns code in the
GNU C Library did not properly account buffer sizes when passed an
unaligned buffer. An attacker could use this to cause a denial of service
or possibly execute arbitrary code. (CVE-2015-1781)
Sumit Bose and Lukas Slebodnik discovered that the Name Service
Switch (NSS) implementation in the GNU C Library did not handle long
lines in the files databases correctly. A local attacker could use
this to cause a denial of service (application crash) or possibly
execute arbitrary code. (CVE-2015-5277)
Adam Nielsen discovered that the strftime function in the GNU C Library did
not properly handle out-of-range argument data. An attacker could use this
to cause a denial of service (application crash) or possibly expose
sensitive information. (CVE-2015-8776)
Hector Marco and Ismael Ripoll discovered that the GNU C Library allowed
the pointer-guarding protection mechanism to be disabled by honoring the
LD_POINTER_GUARD environment variable across privilege boundaries. A local
attacker could use this to exploit an existing vulnerability more easily.
(CVE-2015-8777)
Szabolcs Nagy discovered that the hcreate functions in the GNU C Library
did not properly check its size argument, leading to an integer overflow.
An attacker could use to cause a denial of service (application crash) or
possibly execute arbitrary code. (CVE-2015-8778)
Maksymilian Arciemowicz discovered a stack-based buffer overflow in the
catopen function in the GNU C Library when handling long catalog names. An
attacker could use this to cause a denial of service (application crash) or
possibly execute arbitrary code. (CVE-2015-8779)
Florian Weimer discovered that the getnetbyname implementation in the GNU C
Library did not properly handle long names passed as arguments. An attacker
could use to cause a denial of service (stack exhaustion leading to an
application crash). (CVE-2016-3075)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 15.10 | noarch | libc6 | < 2.21-0ubuntu4.2 | UNKNOWN |
Ubuntu | 15.10 | noarch | glibc-doc | < 2.21-0ubuntu4.2 | UNKNOWN |
Ubuntu | 15.10 | noarch | glibc-source | < 2.21-0ubuntu4.2 | UNKNOWN |
Ubuntu | 15.10 | noarch | libc-bin | < 2.21-0ubuntu4.2 | UNKNOWN |
Ubuntu | 15.10 | noarch | libc-bin-dbgsym | < 2.21-0ubuntu4.2 | UNKNOWN |
Ubuntu | 15.10 | noarch | libc-dev-bin | < 2.21-0ubuntu4.2 | UNKNOWN |
Ubuntu | 15.10 | noarch | libc-dev-bin-dbgsym | < 2.21-0ubuntu4.2 | UNKNOWN |
Ubuntu | 15.10 | noarch | libc6-dbg | < 2.21-0ubuntu4.2 | UNKNOWN |
Ubuntu | 15.10 | noarch | libc6-dbgsym | < 2.21-0ubuntu4.2 | UNKNOWN |
Ubuntu | 15.10 | noarch | libc6-dev | < 2.21-0ubuntu4.2 | UNKNOWN |
ubuntu.com/security/CVE-2013-2207
ubuntu.com/security/CVE-2014-8121
ubuntu.com/security/CVE-2014-9761
ubuntu.com/security/CVE-2015-1781
ubuntu.com/security/CVE-2015-5277
ubuntu.com/security/CVE-2015-8776
ubuntu.com/security/CVE-2015-8777
ubuntu.com/security/CVE-2015-8778
ubuntu.com/security/CVE-2015-8779
ubuntu.com/security/CVE-2016-2856
ubuntu.com/security/CVE-2016-3075
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.5 High
AI Score
Confidence
High
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.123 Low
EPSS
Percentile
95.3%