Do your applications use this vulnerable package?
Test your applications
Overview
In the GNU C Library (aka glibc or libc6) through 2.28, the getaddrinfo function would successfully parse a string that contained an IPv4 address followed by whitespace and arbitrary characters, which could lead applications to incorrectly assume that it had parsed a valid string, without the possibility of embedded HTTP headers or other potentially dangerous substrings.
References
CVSS Score
5.3
medium severity
-
Attack VectorLocal
-
Attack ComplexityLow
-
Privileges RequiredLow
-
User InteractionNone
-
ScopeUnchanged
-
ConfidentialityLow
-
IntegrityLow
-
AvailabilityLow
- CVE
- CVE-2016-10739
- CWE
- CWE-20
- Snyk ID
- SNYK-DEBIAN9-GLIBC-356682
- Disclosed
- 21 Jan, 2019
- Published
- 21 Jan, 2019