CVE-2015-1781
Publication date 28 September 2015
Last updated 24 July 2024
Ubuntu priority
Buffer overflow in the gethostbyname_r and other unspecified NSS functions in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response, which triggers a call with a misaligned buffer.
From the Ubuntu Security Team
Arjun Shankar discovered that in certain situations the nss_dns code in the GNU C Library did not properly account buffer sizes when passed an unaligned buffer. An attacker could use this to cause a denial of service or possibly execute arbitrary code.
Status
Package | Ubuntu Release | Status |
---|---|---|
eglibc | ||
16.04 LTS xenial | Not in release | |
14.04 LTS trusty |
Fixed 2.19-0ubuntu6.8
|
|
glibc | ||
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty | Not in release | |
Notes
sbeattie
only happens if gethostbyname_r etc functions are called with a misaligned buffer, which according to upstream in practice does not happen often
Patch details
Package | Patch details |
---|---|
glibc |
References
Related Ubuntu Security Notices (USN)
- USN-2985-1
- GNU C Library vulnerabilities
- 25 May 2016