Vulnerability Details : CVE-2015-5277
The get_contents function in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) before 2.20 might allow local users to cause a denial of service (heap corruption) or gain privileges via a long line in the NSS files database.
Vulnerability category: Denial of service
Products affected by CVE-2015-5277
- cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-5277
0.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 25 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-5277
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST |
CWE ids for CVE-2015-5277
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-5277
-
https://bugzilla.redhat.com/show_bug.cgi?id=1262914
1262914 – (CVE-2015-5277) CVE-2015-5277 glibc: data corruption while reading the NSS files database
-
http://seclists.org/fulldisclosure/2019/Sep/7
Full Disclosure: SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X
-
http://www.ubuntu.com/usn/USN-2985-1
USN-2985-1: GNU C Library vulnerabilities | Ubuntu security notices
-
https://sourceware.org/ml/libc-alpha/2014-09/msg00088.html
Allan McRae - The GNU C Library version 2.20 is now available
-
http://rhn.redhat.com/errata/RHSA-2015-2172.html
RHSA-2015:2172 - Security Advisory - Red Hat Customer Portal
-
https://sourceware.org/bugzilla/show_bug.cgi?id=17079
17079 – (CVE-2015-5277) nss_files heap-based buffer overflow with small buffer (CVE-2015-5277)
-
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
Oracle Linux Bulletin - October 2015
-
https://seclists.org/bugtraq/2019/Sep/7
Bugtraq: SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X
-
http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
Cisco Device Hardcoded Credentials / GNU glibc / BusyBox ≈ Packet Storm
-
https://security.gentoo.org/glsa/201702-11
GNU C Library: Multiple vulnerabilities (GLSA 201702-11) — Gentoo security
-
http://www.securitytracker.com/id/1034196
Glibc Heap Corruption in nss_files Backend Lets Local Users Gain Elevated Privileges - SecurityTracker
-
http://www.ubuntu.com/usn/USN-2985-2
USN-2985-2: GNU C Library regression | Ubuntu security notices
-
http://www.securityfocus.com/bid/78092
GNU glibc CVE-2015-5277 Local Heap Based Buffer Overflow Vulnerability
Jump to