gnu glibc CVE-2015-0235 vulnerability in GNU and Other Products
Published on January 28, 2015

product logo product logo product logo product logo product logo product logo product logo product logo
Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."

Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory NVD


Products Associated with CVE-2015-0235

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2015-0235 are published in these products:

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
PHP
 

Exploit Probability

EPSS
84.87%
Percentile
99.29%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.