5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
8.8 High
AI Score
Confidence
High
0.032 Low
EPSS
Percentile
91.2%
Package : eglibc
Version : 2.13-38+deb7u11
CVE ID : CVE-2016-1234 CVE-2016-3075 CVE-2016-3706
Several vulnerabilities have been fixed in the Debian GNU C Library,
eglibc:
CVE-2016-1234
Alexander Cherepanov discovered that the glibc's glob implementation
suffered from a stack-based buffer overflow when it was called with the
GLOB_ALTDIRFUNC flag and encountered a long file name.
CVE-2016-3075
The getnetbyname implementation in nss_dns was susceptible to a stack
overflow and a crash if it was invoked on a very long name.
CVE-2016-3706
Michael Petlan reported that getaddrinfo copied large amounts of address
data to the stack, possibly leading to a stack overflow. This complements
the fix for CVE-2013-4458.
For Debian 7 "Wheezy", these problems have been fixed in version
2.13-38+deb7u11.
We recommend you to upgrade your eglibc packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system, and frequently asked questions can be
found at: https://wiki.debian.org/LTS
Attachment:
signature.asc
Description: PGP signature
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 7 | amd64 | libc6-dev-i386 | < 2.13-38+deb7u11 | libc6-dev-i386_2.13-38+deb7u11_amd64.deb |
Debian | 8 | arm64 | libc-bin | < 2.19-18+deb8u5 | libc-bin_2.19-18+deb8u5_arm64.deb |
Debian | 8 | s390x | libc6-dbg | < 2.19-18+deb8u5 | libc6-dbg_2.19-18+deb8u5_s390x.deb |
Debian | 8 | mips | libc6-udeb | < 2.19-18+deb8u5 | libc6-udeb_2.19-18+deb8u5_mips.deb |
Debian | 8 | ppc64el | libc-bin | < 2.19-18+deb8u5 | libc-bin_2.19-18+deb8u5_ppc64el.deb |
Debian | 8 | armhf | libnss-dns-udeb | < 2.19-18+deb8u5 | libnss-dns-udeb_2.19-18+deb8u5_armhf.deb |
Debian | 8 | armhf | nscd | < 2.19-18+deb8u5 | nscd_2.19-18+deb8u5_armhf.deb |
Debian | 8 | mips | nscd | < 2.19-18+deb8u5 | nscd_2.19-18+deb8u5_mips.deb |
Debian | 7 | all | glibc-doc | < 2.13-38+deb7u11 | glibc-doc_2.13-38+deb7u11_all.deb |
Debian | 7 | all | eglibc | < 2.13-38+deb7u11 | eglibc_2.13-38+deb7u11_all.deb |
5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
8.8 High
AI Score
Confidence
High
0.032 Low
EPSS
Percentile
91.2%