Code Affecting glibc package, versions [,2.15)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
1.34% (86th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-GLIBC-2319037
  • published14 Dec 2021
  • disclosed26 Aug 2015
  • creditUnknown

Introduced: 26 Aug 2015

CVE-2013-7424  (opens in a new tab)
CWE-17  (opens in a new tab)

How to fix?

Upgrade glibc to version 2.15 or higher.

Overview

Affected versions of this package are vulnerable to Code. The getaddrinfo function in glibc before 2.15, when compiled with libidn and the AI_IDN flag is used, allows context-dependent attackers to cause a denial of service (invalid free) and possibly execute arbitrary code via unspecified vectors, as demonstrated by an internationalized domain name to ping6.

References

CVSS Scores

version 3.1