Show filters
152 Total Results
Displaying 71-80 of 152
Sort by:
Attacker Value
Unknown

CVE-2017-12132

Disclosure Date: August 01, 2017 (last updated November 26, 2024)
The DNS stub resolver in the GNU C Library (aka glibc or libc6) before version 2.26, when EDNS support is enabled, will solicit large UDP responses from name servers, potentially simplifying off-path DNS spoofing attacks due to IP fragmentation.
0
Attacker Value
Unknown

CVE-2015-5180

Disclosure Date: June 27, 2017 (last updated November 26, 2024)
res_query in libresolv in glibc before 2.25 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash).
0
Attacker Value
Unknown

CVE-2017-1000366

Disclosure Date: June 19, 2017 (last updated November 26, 2024)
glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.
0
Attacker Value
Unknown

CVE-2014-9984

Disclosure Date: June 12, 2017 (last updated November 08, 2023)
nscd in the GNU C Library (aka glibc or libc6) before version 2.20 does not correctly compute the size of an internal buffer when processing netgroup requests, possibly leading to an nscd daemon crash or code execution as the user running nscd.
0
Attacker Value
Unknown

CVE-2017-8804

Disclosure Date: May 07, 2017 (last updated November 08, 2023)
The xdr_bytes and xdr_string functions in the GNU C Library (aka glibc or libc6) 2.25 mishandle failures of buffer deserialization, which allows remote attackers to cause a denial of service (virtual memory allocation, or memory consumption if an overcommit setting is not used) via a crafted UDP packet to port 111, a related issue to CVE-2017-8779. NOTE: [Information provided from upstream and references
0
Attacker Value
Unknown

CVE-2015-8985

Disclosure Date: March 20, 2017 (last updated November 26, 2024)
The pop_fail_stack function in the GNU C Library (aka glibc or libc6) allows context-dependent attackers to cause a denial of service (assertion failure and application crash) via vectors related to extended regular expression processing.
Attacker Value
Unknown

CVE-2015-8984

Disclosure Date: March 20, 2017 (last updated November 08, 2023)
The fnmatch function in the GNU C Library (aka glibc or libc6) before 2.22 might allow context-dependent attackers to cause a denial of service (application crash) via a malformed pattern, which triggers an out-of-bounds read.
0
Attacker Value
Unknown

CVE-2015-8983

Disclosure Date: March 20, 2017 (last updated November 08, 2023)
Integer overflow in the _IO_wstr_overflow function in libio/wstrops.c in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors related to computing a size in bytes, which triggers a heap-based buffer overflow.
0
Attacker Value
Unknown

CVE-2015-8982

Disclosure Date: March 15, 2017 (last updated November 08, 2023)
Integer overflow in the strxfrm function in the GNU C Library (aka glibc or libc6) before 2.21 allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string, which triggers a stack-based buffer overflow.
0
Attacker Value
Unknown

CVE-2016-10228

Disclosure Date: March 02, 2017 (last updated November 08, 2023)
The iconv program in the GNU C Library (aka glibc or libc6) 2.31 and earlier, when invoked with multiple suffixes in the destination encoding (TRANSLATE or IGNORE) along with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service.
0