CVE-2013-7423
Published: 24 February 2015
The send_dg function in resolv/res_send.c in GNU C Library (aka glibc or libc6) before 2.20 does not properly reuse file descriptors, which allows remote attackers to send DNS queries to unintended locations via a large number of requests that trigger a call to the getaddrinfo function.
Notes
Author | Note |
---|---|
mdeslaur | fixed by any/cvs-resolv-reuse-fd.diff in utopic |
Priority
Status
Package | Release | Status |
---|---|---|
glibc Launchpad, Ubuntu, Debian |
precise |
Does not exist
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
lucid |
Does not exist
|
|
utopic |
Not vulnerable
(2.19-10ubuntu2.2)
|
|
Patches: upstream: https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=f9d2d03254a58d92635a311a42253eeed5a40a47 |
||
eglibc Launchpad, Ubuntu, Debian |
upstream |
Needs triage
|
lucid |
Released
(2.11.1-0ubuntu7.21)
|
|
precise |
Released
(2.15-0ubuntu10.11)
|
|
trusty |
Released
(2.19-0ubuntu6.6)
|
|
utopic |
Does not exist
|