A buffer overflow flaw was found in the way glibc's gethostbyname_r() and other related functions computed the size of a buffer when passed a misaligned buffer as input. An attacker able to make an application call any of these functions with a misaligned buffer could use this flaw to crash the application or, potentially, execute arbitrary code with the permissions of the user running the application.
Platform | Package | Release Date | Advisory |
---|---|---|---|
Amazon Linux 1 | glibc | 2015-12-14 10:00 | ALAS-2015-617 |
Amazon Linux 1 | glibc | 2015-04-22 16:12 | ALAS-2015-513 |
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv2 | 5.1 | AV:N/AC:H/Au:N/C:P/I:P/A:P |
NVD | CVSSv2 | 6.8 | AV:N/AC:M/Au:N/C:P/I:P/A:P |