Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
Information
Published : 2015-01-28 11:59
Updated : 2022-07-05 11:42
NVD link : CVE-2015-0235
Mitre link : CVE-2015-0235
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
oracle
- communications_lsms
- communications_user_data_repository
- communications_webrtc_session_controller
- communications_eagle_lnp_application_processor
- communications_policy_management
- communications_eagle_application_processor
- exalogic_infrastructure
- communications_session_border_controller
- communications_application_session_controller
- vm_virtualbox
- linux
apple
- mac_os_x
redhat
- virtualization
debian
- debian_linux
ibm
- security_access_manager_for_enterprise_single_sign-on
- pureapplication_system
gnu
- glibc
php
- php