Mandriva Linux Security Advisory : glibc (MDVSA-2015:218)

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote Mandriva Linux host is missing one or more security
updates.

Description :

Multiple vulnerabilities has been found and corrected in glibc :

It was discovered that, under certain circumstances, glibc's
getaddrinfo\(\) function would send DNS queries to random file
descriptors. An attacker could potentially use this flaw to send DNS
queries to unintended recipients, resulting in information disclosure
or data loss due to the application encountering corrupted data
(CVE-2013-7423).

A buffer overflow flaw was found in the way glibc's
gethostbyname_r\(\) and other related functions computed the size of a
buffer when passed a misaligned buffer as input. An attacker able to
make an application call any of these functions with a misaligned
buffer could use this flaw to crash the application or, potentially,
execute arbitrary code with the permissions of the user running the
application (CVE-2015-1781).

The updated packages provides a solution for these security issues.

See also :

https://rhn.redhat.com/errata/RHSA-2015-0863.html

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)

Family: Mandriva Local Security Checks

Nessus Plugin ID: 83170 ()

Bugtraq ID:

CVE ID: CVE-2013-7423
CVE-2015-1781

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now