Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
History
No history.
Information
Published : 2015-01-28 19:59
Updated : 2024-02-14 01:17
NVD link : CVE-2015-0235
Mitre link : CVE-2015-0235
CVE.ORG link : CVE-2015-0235
JSON object : View
Products Affected
ibm
- pureapplication_system
- security_access_manager_for_enterprise_single_sign-on
redhat
- virtualization
oracle
- communications_lsms
- communications_eagle_application_processor
- linux
- vm_virtualbox
- communications_application_session_controller
- communications_policy_management
- exalogic_infrastructure
- communications_eagle_lnp_application_processor
- communications_session_border_controller
- communications_webrtc_session_controller
- communications_user_data_repository
php
- php
apple
- mac_os_x
gnu
- glibc
debian
- debian_linux
CWE
CWE-787
Out-of-bounds Write