DNS: GNU C Library glibc getanswer_r Buffer Overflow
This signature detects attempts to exploit a code execution vulnerability in GNU C Library. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the targeted daemon.
Extended Description
Buffer overflow in the gethostbyname_r and other unspecified NSS functions in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response, which triggers a call with a misaligned buffer.
Affected Products
Gnu glibc
References
CVE: CVE-2015-1781
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Gnu
Suse
Debian
Canonical
6.8