GNU.C.Library.glibc.getanswer_r.Buffer.Overflow
Description
This indicates an attack attempt against a Buffer Overflow vulnerability in GNU C Library (glibc).
The vulnerability is caused by an error in getanswer_r() glibc function call. It allows a remote attacker to execute arbitrary code on vulnerable systems.
Affected Products
GNU glibc 2.21 and prior
Impact
System Compromise: Remote attacker can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor
https://sourceware.org/git/?p=glibc.git;a=commit;h=2959eda9272a03386
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |