Lucene search

K
cve[email protected]CVE-2014-9402
HistoryFeb 24, 2015 - 3:59 p.m.

CVE-2014-9402

2015-02-2415:59:02
CWE-399
web.nvd.nist.gov
125
cve-2014-9402
nss_dns
getnetbyname
gnu c library
glibc
denial of service
nvd

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

7.9 High

AI Score

Confidence

High

0.107 Low

EPSS

Percentile

95.1%

The nss_dns implementation of getnetbyname in GNU C Library (aka glibc) before 2.21, when the DNS backend in the Name Service Switch configuration is enabled, allows remote attackers to cause a denial of service (infinite loop) by sending a positive answer while a network name is being process.

Affected configurations

NVD
Node
gnuglibcRange2.20
Node
canonicalubuntu_linuxMatch10.04-lts
OR
canonicalubuntu_linuxMatch12.04-lts
OR
canonicalubuntu_linuxMatch14.04lts
OR
canonicalubuntu_linuxMatch14.10
OR
opensuseopensuseMatch13.1
OR
opensuseopensuseMatch13.2
CPENameOperatorVersion
gnu:glibcgnu glibcle2.20

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

7.9 High

AI Score

Confidence

High

0.107 Low

EPSS

Percentile

95.1%