CVE-2015-0235 (retired)

Priority
Description
Heap-based buffer overflow in the __nss_hostname_digits_dots function in
glibc 2.2, and other 2.x versions before 2.18, allows context-dependent
attackers to execute arbitrary code via vectors related to the (1)
gethostbyname or (2) gethostbyname2 function, aka "GHOST."
Assigned-to
sbeattie
Package
Upstream:not-affected (2.18)
Ubuntu 14.04 LTS (Trusty Tahr):not-affected (2.19-0ubuntu6)
Package
Source: glibc (LP Ubuntu Debian)
Upstream:not-affected (2.18)
Ubuntu 14.04 LTS (Trusty Tahr):DNE
More Information

Updated: 2019-03-26 12:14:09 UTC (commit ccdecfcf0fead22bd291e5f4ea745a46872dcb15)