Heap-based buffer overflow in the _nsshostnamedigitsdots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."
{
"binaries": [
{
"binary_name": "eglibc-source",
"binary_version": "2.19-0ubuntu6"
},
{
"binary_name": "glibc-doc",
"binary_version": "2.19-0ubuntu6"
},
{
"binary_name": "libc-bin",
"binary_version": "2.19-0ubuntu6"
},
{
"binary_name": "libc-dev-bin",
"binary_version": "2.19-0ubuntu6"
},
{
"binary_name": "libc6",
"binary_version": "2.19-0ubuntu6"
},
{
"binary_name": "libc6-amd64",
"binary_version": "2.19-0ubuntu6"
},
{
"binary_name": "libc6-armel",
"binary_version": "2.19-0ubuntu6"
},
{
"binary_name": "libc6-dbg",
"binary_version": "2.19-0ubuntu6"
},
{
"binary_name": "libc6-dev",
"binary_version": "2.19-0ubuntu6"
},
{
"binary_name": "libc6-dev-amd64",
"binary_version": "2.19-0ubuntu6"
},
{
"binary_name": "libc6-dev-armel",
"binary_version": "2.19-0ubuntu6"
},
{
"binary_name": "libc6-dev-i386",
"binary_version": "2.19-0ubuntu6"
},
{
"binary_name": "libc6-dev-ppc64",
"binary_version": "2.19-0ubuntu6"
},
{
"binary_name": "libc6-dev-x32",
"binary_version": "2.19-0ubuntu6"
},
{
"binary_name": "libc6-i386",
"binary_version": "2.19-0ubuntu6"
},
{
"binary_name": "libc6-pic",
"binary_version": "2.19-0ubuntu6"
},
{
"binary_name": "libc6-ppc64",
"binary_version": "2.19-0ubuntu6"
},
{
"binary_name": "libc6-prof",
"binary_version": "2.19-0ubuntu6"
},
{
"binary_name": "libc6-udeb",
"binary_version": "2.19-0ubuntu6"
},
{
"binary_name": "libc6-x32",
"binary_version": "2.19-0ubuntu6"
},
{
"binary_name": "libnss-dns-udeb",
"binary_version": "2.19-0ubuntu6"
},
{
"binary_name": "libnss-files-udeb",
"binary_version": "2.19-0ubuntu6"
},
{
"binary_name": "multiarch-support",
"binary_version": "2.19-0ubuntu6"
},
{
"binary_name": "nscd",
"binary_version": "2.19-0ubuntu6"
}
],
"availability": "No subscription required"
}