Rapid7 Vulnerability & Exploit Database

CESA-2004:383: glibc security update

Free InsightVM Trial No credit card necessary
Watch Demo See how it all works
Back to Search

CESA-2004:383: glibc security update

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
11/29/2002
Created
07/25/2018
Added
03/12/2010
Modified
07/04/2017

Description

Updated glibc packages that fix a security flaw in the resolver as well as dlclose handling are now available.

The GNU libc packages (known as glibc) contain the standard C libraries used by applications. A security audit of the glibc packages in CentOS Linux 2.1 found a flaw in the resolver library which was originally reported as affecting versions of ISC BIND 4.9. This flaw also applied to glibc versions before 2.3.2. An attacker who is able to send DNS responses (perhaps by creating a malicious DNS server) could remotely exploit this vulnerability to execute arbitrary code or cause a denial of service. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2002-0029 to this issue. These updated packages also fix a dlclose function bug on certain shared libraries, which caused program crashes. All users of glibc should upgrade to these updated packages, which resolve these issues.

Solution(s)

  • centos-upgrade-glibc
  • centos-upgrade-glibc-common
  • centos-upgrade-glibc-devel
  • centos-upgrade-glibc-profile
  • centos-upgrade-nscd

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;