CVE-2015-1781 (retired)

Priority
Description
Buffer overflow in the gethostbyname_r and other unspecified NSS functions
in the GNU C Library (aka glibc or libc6) before 2.22 allows
context-dependent attackers to cause a denial of service (crash) or execute
arbitrary code via a crafted DNS response, which triggers a call with a
misaligned buffer.
Ubuntu-Description
Arjun Shankar discovered that in certain situations the nss_dns code
in the GNU C Library did not properly account buffer sizes when
passed an unaligned buffer. An attacker could use this to cause a
denial of service or possibly execute arbitrary code.
Notes
 sbeattie> only happens if gethostbyname_r etc functions are called with a misaligned
  buffer, which according to upstream in practice does not happen often
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):released (2.15-0ubuntu10.14)
Ubuntu 14.04 LTS (Trusty Tahr):released (2.19-0ubuntu6.8)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Source: glibc (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 LTS (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (2.23-0ubuntu1)
Patches:
Upstream:https://sourceware.org/git/?p=glibc.git;a=commit;h=2959eda9272a03386
More Information

Updated: 2019-03-26 12:14:42 UTC (commit ccdecfcf0fead22bd291e5f4ea745a46872dcb15)