Vulnerability & Exploit Database

Displaying entries 1 - 10 of 21 in total

Results for: CVE-2016-3075 Back to search

SUSE: CVE-2016-3075: SUSE Linux Security Advisory Vulnerability

  • Severity: 5
  • Published: June 01, 2016

Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.

Huawei EulerOS: CVE-2016-3075: glibc security update Vulnerability

  • Severity: 5
  • Published: June 01, 2016

Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.

Gentoo Linux: CVE-2016-3075: GNU C Library: Multiple vulnerabilities Vulnerability

  • Severity: 5
  • Published: June 01, 2016

Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.

Amazon Linux AMI: CVE-2016-3075: Security patch for glibc (ALAS-2017-792) Vulnerability

  • Severity: 5
  • Published: June 01, 2016

Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.

Debian: CVE-2016-3075: eglibc - security update Vulnerability

  • Severity: 5
  • Published: May 29, 2016

Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.

Ubuntu: (Multiple Advisories) (CVE-2016-3075): GNU C Library regression Vulnerability

  • Severity: 5
  • Published: May 26, 2016

Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.

F5 Networks: K15439022 (CVE-2016-3075): glibc vulnerability CVE-2016-3075 Vulnerability

  • Severity: 5
  • Published: May 23, 2016

Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.

Ubuntu: USN-3075-1 (CVE-2016-4024): Imlib2 vulnerabilities Vulnerability

  • Severity: 8
  • Published: May 13, 2016

Integer overflow in imlib2 before 1.4.9 on 32-bit platforms allows remote attackers to execute arbitrary code via large dimensions in an image, which triggers an out-of-bounds heap memory write operation.