Gnu

Glibc

152 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.06%
  • Published 20.01.2016 05:59:01
  • Last modified 12.04.2025 10:46:40

The process_envvars function in elf/rtld.c in the GNU C Library (aka glibc or libc6) before 2.23 allows local users to bypass a pointer-guarding protection mechanism via a zero value of the LD_POINTER_GUARD environment variable.

  • EPSS 0.09%
  • Published 17.12.2015 19:59:02
  • Last modified 12.04.2025 10:46:40

The get_contents function in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) before 2.20 might allow local users to cause a denial of service (heap corruption) or gain privileges via a long line in the NSS...

  • EPSS 7.79%
  • Published 28.09.2015 20:59:00
  • Last modified 12.04.2025 10:46:40

Buffer overflow in the gethostbyname_r and other unspecified NSS functions in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS respo...

  • EPSS 0.79%
  • Published 26.08.2015 19:59:00
  • Last modified 12.04.2025 10:46:40

The getaddrinfo function in glibc before 2.15, when compiled with libidn and the AI_IDN flag is used, allows context-dependent attackers to cause a denial of service (invalid free) and possibly execute arbitrary code via unspecified vectors, as demon...

  • EPSS 0.45%
  • Published 08.04.2015 10:59:03
  • Last modified 12.04.2025 10:46:40

The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during a risk-management decision for use of the alloca function, which might allow context-dependent attackers t...

  • EPSS 4.76%
  • Published 08.04.2015 10:59:02
  • Last modified 12.04.2025 10:46:40

The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during memory allocation, which allows context-dependent attackers to cause a denial of service (buffer overflow)...

Exploit
  • EPSS 2.99%
  • Published 27.03.2015 14:59:03
  • Last modified 12.04.2025 10:46:40

DB_LOOKUP in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) 2.21 and earlier does not properly check if a file is open, which allows remote attackers to cause a denial of service (infinite loop) by perfor...

Exploit
  • EPSS 3.22%
  • Published 24.02.2015 15:59:02
  • Last modified 12.04.2025 10:46:40

The nss_dns implementation of getnetbyname in GNU C Library (aka glibc) before 2.21, when the DNS backend in the Name Service Switch configuration is enabled, allows remote attackers to cause a denial of service (infinite loop) by sending a positive ...

  • EPSS 4.67%
  • Published 24.02.2015 15:59:00
  • Last modified 12.04.2025 10:46:40

The send_dg function in resolv/res_send.c in GNU C Library (aka glibc or libc6) before 2.20 does not properly reuse file descriptors, which allows remote attackers to send DNS queries to unintended locations via a large number of requests that trigge...

Exploit
  • EPSS 85.45%
  • Published 28.01.2015 19:59:00
  • Last modified 12.04.2025 10:46:40

Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 fu...