CVE-2016-3706

Published: 10 June 2016

Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in the GNU C Library (aka glibc or libc6) allows remote attackers to cause a denial of service (crash) via vectors involving hostent conversion. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-4458.

From the Ubuntu security team

Michael Petlan discovered an unbounded stack allocation in the getaddrinfo() function of the GNU C Library. An attacker could use this to cause a denial of service.

Priority

Low

CVSS 3 base score: 7.5

Status

Package Release Status
eglibc
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 21.04 (Hirsute Hippo) Does not exist

Ubuntu 20.04 LTS (Focal Fossa) Does not exist

Ubuntu 18.04 LTS (Bionic Beaver) Does not exist

Ubuntu 16.04 ESM (Xenial Xerus) Does not exist

Ubuntu 14.04 ESM (Trusty Tahr)
Released (2.19-0ubuntu6.10)
glibc
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 21.04 (Hirsute Hippo) Not vulnerable
(2.24-0ubuntu1)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(2.24-0ubuntu1)
Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable
(2.24-0ubuntu1)
Ubuntu 16.04 ESM (Xenial Xerus)
Released (2.23-0ubuntu6)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist

Patches:
Upstream: https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=4ab2ab03d4351914ee53248dc5aef4a8c88ff8b9 (trunk)
Upstream: https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=1a8a7c12950a0026a3c406a7cb1608f96aa1460e (2.23 fix)