Oval Definition:oval:com.ubuntu.xenial:def:201630750000000
Revision Date:2016-06-01Version:1
Title:CVE-2016-3075 on Ubuntu 16.04 LTS (xenial) - low.
Description:Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name. Florian Weimer discovered that the getnetbyname implementation in the GNU C Library did not properly handle long names passed as arguments. An attacker could use to cause a denial of service (stack exhaustion leading to an application crash).
Family:unixClass:vulnerability
Status:Reference(s):CVE-2016-3075
Platform(s):Ubuntu 16.04 LTS
Product(s):
Definition Synopsis
  • Ubuntu 16.04 LTS (xenial) is installed.
  • AND glibc package in xenial, is related to the CVE in some way and has been fixed (note: '2.23-0ubuntu3').
  • BACK