{
  "threat_severity" : "Low",
  "public_date" : "2013-04-03T00:00:00Z",
  "bugzilla" : {
    "description" : "glibc: Stack (frame) overflow in getaddrinfo() when processing entry mapping to long list of address structures",
    "id" : "947882",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=947882"
  },
  "cvss" : {
    "cvss_base_score" : "4.3",
    "cvss_scoring_vector" : "AV:N/AC:M/Au:N/C:N/I:N/A:P",
    "status" : "verified"
  },
  "details" : [ "Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.17 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of domain conversion results.", "It was found that getaddrinfo() did not limit the amount of stack memory used during name resolution. An attacker able to make an application resolve an attacker-controlled hostname or IP address could possibly cause the application to exhaust all stack memory and crash." ],
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 5",
    "release_date" : "2013-04-24T00:00:00Z",
    "advisory" : "RHSA-2013:0769",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5",
    "package" : "glibc-0:2.5-107.el5_9.4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "release_date" : "2013-11-20T00:00:00Z",
    "advisory" : "RHSA-2013:1605",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6",
    "package" : "glibc-0:2.12-1.132.el6"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "glibc",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2013-1914\nhttps://nvd.nist.gov/vuln/detail/CVE-2013-1914" ],
  "name" : "CVE-2013-1914",
  "csaw" : false
}