A heap-based buffer overflow was found in glibc's __nss_hostname_digits_dots() function, which is used by the gethostbyname() and gethostbyname2() glibc function calls. A remote attacker able to make an application call either of these functions could use this flaw to execute arbitrary code with the permissions of the user running the application.
Read more details:
RedHat: http://ift.tt/1CvHfIe
Ubuntu: http://ift.tt/1p550Rx
Debian: http://ift.tt/15ISy2R
GNU C Library: http://ift.tt/P4wwJH
Solution:
RHEL/CentOS : sudo yum update glibc
Ubuntu : sudo apt-get update ; sudo apt-get install libc6
http://ift.tt/1dvHQ0Z
0 comments:
Post a Comment