The nss_dns implementation of getnetbyname in GNU C Library (aka glibc) before 2.21, when the DNS backend in the Name Service Switch configuration is enabled, allows remote attackers to cause a denial of service (infinite loop) by sending a positive answer while a network name is being process.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Glibc | Gnu | * | 2.20 (including) |
Red Hat Enterprise Linux 7 | RedHat | glibc-0:2.17-222.el7 | * |
Eglibc | Ubuntu | lucid | * |
Eglibc | Ubuntu | precise | * |
Eglibc | Ubuntu | trusty | * |
Glibc | Ubuntu | upstream | * |
Glibc | Ubuntu | utopic | * |