CVE-2020-15688

Vulnerability updated 6 months ago (2024-11-29T14:00:31.280Z)
Download STIX
Preview STIX
CVE-2020-15688 is a vulnerability that affected the GNU C Library (glibc) version 2.32 and earlier. It was discovered in September 2020 by Google's Project Zero security team and reported to glibc developers. The flaw could be exploited by an attacker to execute arbitrary code or cause a denial of service (DoS) attack on vulnerable systems. The vulnerability was caused by a buffer overflow in the function __nss_hostname_digits_dots() in the nss_hostname_digits_dots() module of glibc. This function converts hostnames containing numeric IP address components into their binary form. An attacker could exploit this vulnerability by sending a specially crafted hostname to a vulnerable system, which would trigger the buffer overflow and allow them to execute arbitrary code or cause a DoS. The vulnerability was patched in glibc version 2.32-9, which was released on October 20, 2020. However, it is important for organizations to ensure that all their systems running earlier versions of glibc are updated to the patched version to prevent exploitation of this vulnerability. As always, it is critical to keep software up-to-date and follow best practices for secure coding to reduce the risk of vulnerabilities like CVE-2020-15688.
Description last updated: 2023-06-24T00:22:19.356Z
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the CVE-2020-15688 Vulnerability was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
CISA
2 years ago