Search for vulnerabilities
Vulnerability details: VCID-cdst-c5z2-aaan
Vulnerability ID VCID-cdst-c5z2-aaan
Aliases CVE-2016-3075
Summary Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.
Status Published
Exploitability 0.5
Weighted Severity 6.8
Risk 3.4
Affected and Fixed Packages Package Details
Weaknesses (2)
System Score Found at
generic_textual Low http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-3075.html
rhas Low https://access.redhat.com/errata/RHSA-2016:2573
cvssv3 7.0 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3075.json
epss 0.00991 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.00991 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.00991 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.00991 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.00991 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.00991 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.00991 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.00991 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.00991 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.00991 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.00991 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.00991 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.00991 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.00991 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.00991 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.11367 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.11367 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.11367 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.19356 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.19356 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.19356 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.19356 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.19356 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.19356 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.19356 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.19356 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.19356 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.19356 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.19356 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.19356 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.19356 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.19356 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.19356 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.19356 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.19356 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.19356 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.19356 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.19356 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.19356 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.19356 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.19356 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.19356 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.19356 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.19356 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.19356 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.19356 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.19356 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.19356 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.19356 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.19356 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.19356 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.19356 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.19356 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.19356 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.19356 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.19356 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.19356 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.19356 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.19356 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.19356 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.19356 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.19356 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.19356 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.19356 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.19356 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.19356 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
epss 0.32032 https://api.first.org/data/v1/epss?cve=CVE-2016-3075
rhbs low https://bugzilla.redhat.com/show_bug.cgi?id=1321866
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3075
cvssv2 4 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2016-3075
cvssv3 7.5 https://nvd.nist.gov/vuln/detail/CVE-2016-3075
generic_textual Low https://sourceware.org/bugzilla/show_bug.cgi?id=19879
generic_textual Low https://ubuntu.com/security/notices/USN-2985-1
Reference id Reference type URL
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html
http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html
http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-3075.html
http://rhn.redhat.com/errata/RHSA-2016-2573.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3075.json
https://api.first.org/data/v1/epss?cve=CVE-2016-3075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3075
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://security.gentoo.org/glsa/201702-11
https://sourceware.org/bugzilla/show_bug.cgi?id=19879
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=317b199b4aff8cfa27f2302ab404d2bb5032b9a4
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=317b199b4aff8cfa27f2302ab404d2bb5032b9a4
https://ubuntu.com/security/notices/USN-2985-1
http://www.securityfocus.com/bid/85732
http://www.ubuntu.com/usn/USN-2985-1
1321866 https://bugzilla.redhat.com/show_bug.cgi?id=1321866
cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
CVE-2016-3075 https://nvd.nist.gov/vuln/detail/CVE-2016-3075
RHSA-2016:2573 https://access.redhat.com/errata/RHSA-2016:2573
USN-2985-1 https://usn.ubuntu.com/2985-1/
No exploits are available.
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3075.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:H/Au:N/C:N/I:P/A:P Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2016-3075
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2016-3075
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.83981
EPSS Score 0.00991
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.