[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
OVAL

ELSA-2015-0327 -- Oracle glibc

ID: oval:org.secpod.oval:def:1500924Date: (C)2015-03-24   (M)2024-02-19
Class: PATCHFamily: unix




Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."

Platform:
Oracle Linux 7
Product:
glibc
Reference:
ELSA-2015-0327
CVE-2014-8121
CVE-2014-6040
CVE    2
CVE-2014-6040
CVE-2014-8121
CPE    2
cpe:/a:glibc:glibc
cpe:/o:oracle:linux:7

© SecPod Technologies