The getaddrinfo function in glibc before 2.15, when compiled with libidn and the AI_IDN flag is used, allows context-dependent attackers to cause a denial of service (invalid free) and possibly execute arbitrary code via unspecified vectors, as demonstrated by an internationalized domain name to ping6.
References
Configurations
History
21 Nov 2024, 02:00
Type | Values Removed | Values Added |
---|---|---|
References | () http://rhn.redhat.com/errata/RHSA-2015-1627.html - Vendor Advisory | |
References | () http://www.openwall.com/lists/oss-security/2015/01/29/21 - | |
References | () http://www.securityfocus.com/bid/72710 - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1186614 - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=981942 - | |
References | () https://sourceware.org/bugzilla/show_bug.cgi?id=18011 - | |
References | () https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=2e96f1c7 - |
Information
Published : 2015-08-26 19:59
Updated : 2024-11-21 02:00
NVD link : CVE-2013-7424
Mitre link : CVE-2013-7424
CVE.ORG link : CVE-2013-7424
JSON object : View
Products Affected
gnu
- glibc
CWE
CWE-17
DEPRECATED: Code