← Zuruck zu CVEs
CVE-2013-4357
HIGH7.5
Beschreibung
The eglibc package before 2.14 incorrectly handled the getaddrinfo() function. An attacker could use this issue to cause a denial of service.
CVE Details
CVSS v3.1 Bewertung7.5
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht12/31/2019
Zuletzt geandert11/21/2024
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
canonical:ubuntu_linuxdebian:debian_linuxeglibc:eglibcfedoraproject:fedoranovell:suse_linux_enterprise_server
Schwachen (CWE)
CWE-120
Referenzen
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00020.html(secalert@redhat.com)
http://www.openwall.com/lists/oss-security/2013/09/17/4(secalert@redhat.com)
http://www.openwall.com/lists/oss-security/2013/09/17/8(secalert@redhat.com)
http://www.openwall.com/lists/oss-security/2015/01/28/18(secalert@redhat.com)
http://www.openwall.com/lists/oss-security/2015/01/29/21(secalert@redhat.com)
http://www.openwall.com/lists/oss-security/2015/02/24/3(secalert@redhat.com)
http://www.securityfocus.com/bid/67992(secalert@redhat.com)
http://www.ubuntu.com/usn/USN-2306-1(secalert@redhat.com)
http://www.ubuntu.com/usn/USN-2306-2(secalert@redhat.com)
http://www.ubuntu.com/usn/USN-2306-3(secalert@redhat.com)
https://access.redhat.com/security/cve/cve-2013-4357(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4357(secalert@redhat.com)
https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-4357(secalert@redhat.com)
https://exchange.xforce.ibmcloud.com/vulnerabilities/95103(secalert@redhat.com)
https://security-tracker.debian.org/tracker/CVE-2013-4357(secalert@redhat.com)
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00020.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2013/09/17/4(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2013/09/17/8(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2015/01/28/18(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2015/01/29/21(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2015/02/24/3(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/67992(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-2306-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-2306-2(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-2306-3(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/security/cve/cve-2013-4357(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4357(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-4357(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/95103(af854a3a-2127-422b-91ae-364da2661108)
https://security-tracker.debian.org/tracker/CVE-2013-4357(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.