CVE-2015-0235

Priority
Description
Heap-based buffer overflow in the __nss_hostname_digits_dots function in
glibc 2.2, and other 2.x versions before 2.18, allows context-dependent
attackers to execute arbitrary code via vectors related to the (1)
gethostbyname or (2) gethostbyname2 function, aka "GHOST."
Assigned-to
sbeattie
Notes
Package
Upstream:not-affected (2.18)
Ubuntu 14.04 ESM (Trusty Tahr):not-affected (2.19-0ubuntu6)
Package
Source: glibc (LP Ubuntu Debian)
Upstream:not-affected (2.18)
Ubuntu 14.04 ESM (Trusty Tahr):DNE
More Information

Updated: 2019-12-05 18:39:18 UTC (commit dd38ff22974aae499eb50644b9d5a2817483cbdb)