CVE-2016-10739

In the GNU C Library (aka glibc or libc6) through 2.28, the getaddrinfo function would successfully parse a string that contained an IPv4 address followed by whitespace and arbitrary characters, which could lead applications to incorrectly assume that it had parsed a valid string, without the possibility of embedded HTTP headers or other potentially dangerous substrings.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2019-01-21 19:29

Updated : 2024-02-04 20:03


NVD link : CVE-2016-10739

Mitre link : CVE-2016-10739

CVE.ORG link : CVE-2016-10739


JSON object : View

Products Affected

gnu

  • glibc

opensuse

  • leap
CWE
CWE-20

Improper Input Validation