CVE-2013-1914

Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.17 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of domain conversion results.
References
Link Resource
http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html
http://rhn.redhat.com/errata/RHSA-2013-0769.html
http://rhn.redhat.com/errata/RHSA-2013-1605.html
http://seclists.org/fulldisclosure/2021/Sep/0
http://secunia.com/advisories/52817 Vendor Advisory
http://secunia.com/advisories/55113
http://sourceware.org/bugzilla/show_bug.cgi?id=15330
http://sourceware.org/git/?p=glibc.git%3Ba=commitdiff%3Bh=1cef1b19089528db11f221e938f60b9b048945d7
http://www.mandriva.com/security/advisories?name=MDVSA-2013:163
http://www.mandriva.com/security/advisories?name=MDVSA-2013:283
http://www.mandriva.com/security/advisories?name=MDVSA-2013:284
http://www.openwall.com/lists/oss-security/2013/04/03/2
http://www.openwall.com/lists/oss-security/2013/04/03/8
http://www.openwall.com/lists/oss-security/2013/04/05/1
http://www.securityfocus.com/bid/58839
http://www.ubuntu.com/usn/USN-1991-1
http://www.vmware.com/security/advisories/VMSA-2014-0008.html
https://bugzilla.novell.com/show_bug.cgi?id=813121
https://bugzilla.redhat.com/show_bug.cgi?id=947882
https://security.gentoo.org/glsa/201503-04
http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html
http://rhn.redhat.com/errata/RHSA-2013-0769.html
http://rhn.redhat.com/errata/RHSA-2013-1605.html
http://seclists.org/fulldisclosure/2021/Sep/0
http://secunia.com/advisories/52817 Vendor Advisory
http://secunia.com/advisories/55113
http://sourceware.org/bugzilla/show_bug.cgi?id=15330
http://sourceware.org/git/?p=glibc.git%3Ba=commitdiff%3Bh=1cef1b19089528db11f221e938f60b9b048945d7
http://www.mandriva.com/security/advisories?name=MDVSA-2013:163
http://www.mandriva.com/security/advisories?name=MDVSA-2013:283
http://www.mandriva.com/security/advisories?name=MDVSA-2013:284
http://www.openwall.com/lists/oss-security/2013/04/03/2
http://www.openwall.com/lists/oss-security/2013/04/03/8
http://www.openwall.com/lists/oss-security/2013/04/05/1
http://www.securityfocus.com/bid/58839
http://www.ubuntu.com/usn/USN-1991-1
http://www.vmware.com/security/advisories/VMSA-2014-0008.html
https://bugzilla.novell.com/show_bug.cgi?id=813121
https://bugzilla.redhat.com/show_bug.cgi?id=947882
https://security.gentoo.org/glsa/201503-04
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*

History

21 Nov 2024, 01:50

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html - () http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html -
References () http://rhn.redhat.com/errata/RHSA-2013-0769.html - () http://rhn.redhat.com/errata/RHSA-2013-0769.html -
References () http://rhn.redhat.com/errata/RHSA-2013-1605.html - () http://rhn.redhat.com/errata/RHSA-2013-1605.html -
References () http://seclists.org/fulldisclosure/2021/Sep/0 - () http://seclists.org/fulldisclosure/2021/Sep/0 -
References () http://secunia.com/advisories/52817 - Vendor Advisory () http://secunia.com/advisories/52817 - Vendor Advisory
References () http://secunia.com/advisories/55113 - () http://secunia.com/advisories/55113 -
References () http://sourceware.org/bugzilla/show_bug.cgi?id=15330 - () http://sourceware.org/bugzilla/show_bug.cgi?id=15330 -
References () http://sourceware.org/git/?p=glibc.git%3Ba=commitdiff%3Bh=1cef1b19089528db11f221e938f60b9b048945d7 - () http://sourceware.org/git/?p=glibc.git%3Ba=commitdiff%3Bh=1cef1b19089528db11f221e938f60b9b048945d7 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2013:163 - () http://www.mandriva.com/security/advisories?name=MDVSA-2013:163 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2013:283 - () http://www.mandriva.com/security/advisories?name=MDVSA-2013:283 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2013:284 - () http://www.mandriva.com/security/advisories?name=MDVSA-2013:284 -
References () http://www.openwall.com/lists/oss-security/2013/04/03/2 - () http://www.openwall.com/lists/oss-security/2013/04/03/2 -
References () http://www.openwall.com/lists/oss-security/2013/04/03/8 - () http://www.openwall.com/lists/oss-security/2013/04/03/8 -
References () http://www.openwall.com/lists/oss-security/2013/04/05/1 - () http://www.openwall.com/lists/oss-security/2013/04/05/1 -
References () http://www.securityfocus.com/bid/58839 - () http://www.securityfocus.com/bid/58839 -
References () http://www.ubuntu.com/usn/USN-1991-1 - () http://www.ubuntu.com/usn/USN-1991-1 -
References () http://www.vmware.com/security/advisories/VMSA-2014-0008.html - () http://www.vmware.com/security/advisories/VMSA-2014-0008.html -
References () https://bugzilla.novell.com/show_bug.cgi?id=813121 - () https://bugzilla.novell.com/show_bug.cgi?id=813121 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=947882 - () https://bugzilla.redhat.com/show_bug.cgi?id=947882 -
References () https://security.gentoo.org/glsa/201503-04 - () https://security.gentoo.org/glsa/201503-04 -

Information

Published : 2013-04-29 22:55

Updated : 2024-11-21 01:50


NVD link : CVE-2013-1914

Mitre link : CVE-2013-1914

CVE.ORG link : CVE-2013-1914


JSON object : View

Products Affected

gnu

  • glibc
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer