CVE-2016-3075Improper Restriction of Operations within the Bounds of a Memory Buffer in Glibc

Severity
7.5HIGHNVD
EPSS
10.9%
top 6.60%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 1
Latest updateMay 14

Description

Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

Debiangnu/glibc< 2.22-6+3
NVDgnu/glibc2.23

Also affects: Fedora 23, Ubuntu Linux 12.04, 14.04, 15.10

🔴Vulnerability Details

3
GHSA
GHSA-7x96-w64p-8chw: Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 22022-05-14
CVEList
CVE-2016-3075: Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 22016-06-01
OSV
CVE-2016-3075: Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 22016-06-01

📋Vendor Advisories

3
Ubuntu
GNU C Library vulnerabilities2016-05-25
Red Hat
glibc: Stack overflow in nss_dns_getnetbyname_r2016-03-29
Debian
CVE-2016-3075: glibc - Stack-based buffer overflow in the nss_dns implementation of the getnetbyname fu...2016

💬Community

2
Bugzilla
CVE-2016-3075 glibc: Stack overflow in nss_dns_getnetbyname_r2016-03-29
Bugzilla
CVE-2016-3075 glibc: Stack overflow in nss_dns_getnetbyname_r [fedora-all]2016-03-29
CVE-2016-3075 — GNU Glibc vulnerability | cvebase