Vulnerability   
Search   
    Search 211766 CVE descriptions
and 97459 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.871075
Category:Red Hat Local Security Checks
Title:RedHat Update for glibc RHSA-2013:1605-02
Summary:The remote host is missing an update for the 'glibc'; package(s) announced via the referenced advisory.
Description:Summary:
The remote host is missing an update for the 'glibc'
package(s) announced via the referenced advisory.

Vulnerability Insight:
The glibc packages provide the standard C libraries (libc), POSIX thread
libraries (libpthread), standard math libraries (libm), and the Name Server
Caching Daemon (nscd) used by multiple programs on the system. Without
these libraries, the Linux system cannot function correctly.

Multiple integer overflow flaws, leading to heap-based buffer overflows,
were found in glibc's memory allocator functions (pvalloc, valloc, and
memalign). If an application used such a function, it could cause the
application to crash or, potentially, execute arbitrary code with the
privileges of the user running the application. (CVE-2013-4332)

A flaw was found in the regular expression matching routines that process
multibyte character input. If an application utilized the glibc regular
expression matching mechanism, an attacker could provide specially-crafted
input that, when processed, would cause the application to crash.
(CVE-2013-0242)

It was found that getaddrinfo() did not limit the amount of stack memory
used during name resolution. An attacker able to make an application
resolve an attacker-controlled hostname or IP address could possibly cause
the application to exhaust all stack memory and crash. (CVE-2013-1914)

Among other changes, this update includes an important fix for the
following bug:

* Due to a defect in the initial release of the getaddrinfo() system call
in Red Hat enterprise Linux 6.0, AF_INET and AF_INET6 queries resolved from
the /etc/hosts file returned queried names as canonical names. This
incorrect behavior is, however, still considered to be the expected
behavior. As a result of a recent change in getaddrinfo(), AF_INET6 queries
started resolving the canonical names correctly. However, this behavior was
unexpected by applications that relied on queries resolved from the
/etc/hosts file, and these applications could thus fail to operate
properly. This update applies a fix ensuring that AF_INET6 queries resolved
from /etc/hosts always return the queried name as canonical. Note that DNS
lookups are resolved properly and always return the correct canonical
names. A proper fix to AF_INET6 queries resolution from /etc/hosts may be
applied in future releases for now, due to a lack of standard, Red Hat
suggests the first entry in the /etc/hosts file, that applies for the IP
address being resolved, to be considered the canonical entry. (BZ#1022022)

These updated glibc packages also include additional bug fixes and
various enhancements. Space precludes documenting all of these ...

Description truncated, please see the referenced URL(s) for more information.

Affected Software/OS:
glibc on Red Hat Enterprise Linux Desktop (v. 6),
Red Hat Enterprise Linux Server (v. 6),
Red Hat Enterprise Linux Workstation (v. 6)

Solution:
Please Install the Updated Packages.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2013-0242
BugTraq ID: 57638
http://www.securityfocus.com/bid/57638
https://security.gentoo.org/glsa/201503-04
http://www.mandriva.com/security/advisories?name=MDVSA-2013:163
http://sourceware.org/bugzilla/show_bug.cgi?id=15078
http://sourceware.org/ml/libc-alpha/2013-01/msg00967.html
http://www.openwall.com/lists/oss-security/2013/01/30/5
http://osvdb.org/89747
RedHat Security Advisories: RHSA-2013:0769
http://rhn.redhat.com/errata/RHSA-2013-0769.html
RedHat Security Advisories: RHSA-2013:1605
http://rhn.redhat.com/errata/RHSA-2013-1605.html
http://www.securitytracker.com/id/1028063
http://secunia.com/advisories/51951
http://secunia.com/advisories/55113
http://www.ubuntu.com/usn/USN-1991-1
XForce ISS Database: glibc-extendbuffers-dos(81707)
https://exchange.xforce.ibmcloud.com/vulnerabilities/81707
Common Vulnerability Exposure (CVE) ID: CVE-2013-1914
BugTraq ID: 58839
http://www.securityfocus.com/bid/58839
http://www.mandriva.com/security/advisories?name=MDVSA-2013:283
http://www.mandriva.com/security/advisories?name=MDVSA-2013:284
https://bugzilla.novell.com/show_bug.cgi?id=813121
https://bugzilla.redhat.com/show_bug.cgi?id=947882
http://www.openwall.com/lists/oss-security/2013/04/03/2
http://www.openwall.com/lists/oss-security/2013/04/03/8
http://www.openwall.com/lists/oss-security/2013/04/05/1
http://secunia.com/advisories/52817
Common Vulnerability Exposure (CVE) ID: CVE-2013-4332
BugTraq ID: 62324
http://www.securityfocus.com/bid/62324
http://www.openwall.com/lists/oss-security/2013/09/12/6
RedHat Security Advisories: RHSA-2013:1411
http://rhn.redhat.com/errata/RHSA-2013-1411.html
CopyrightCopyright (C) 2013 Greenbone Networks GmbH

This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2021 E-Soft Inc. All rights reserved.