A heap-based buffer overflow was found in glibc's __nss_hostname_digits_dots() function, which is used by the gethostbyname() and gethostbyname2() glibc function calls. A remote attacker able to make an application call either of these functions could use this flaw to execute arbitrary code with the permissions of the user running the application.
Platform | Package | Release Date | Advisory |
---|---|---|---|
Amazon Linux 1 | glibc | 2015-01-27 11:41 | ALAS-2015-473 |
Amazon Linux 1 | php54 | 2015-03-13 10:00 | ALAS-2015-493 |
Amazon Linux 1 | php55 | 2015-03-23 08:29 | ALAS-2015-494 |
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv2 | 6.8 | AV:N/AC:M/Au:N/C:P/I:P/A:P |
NVD | CVSSv2 | 10.0 | AV:N/AC:L/Au:N/C:C/I:C/A:C |