CVE-2015-0235

Priority
Description
Heap-based buffer overflow in the __nss_hostname_digits_dots function in
glibc 2.2, and other 2.x versions before 2.18, allows context-dependent
attackers to execute arbitrary code via vectors related to the (1)
gethostbyname or (2) gethostbyname2 function, aka "GHOST."
Assigned-to
sbeattie
Package
Upstream:not-affected (2.18)
Ubuntu 14.04 LTS (Trusty Tahr):not-affected (2.19-0ubuntu6)
Package
Source: glibc (LP Ubuntu Debian)
Upstream:not-affected (2.18)
Ubuntu 14.04 LTS (Trusty Tahr):DNE
More Information

Updated: 2019-01-14 22:15:10 UTC (commit 51f9b73af244ba86b9321e46e526586c25a8e060)