TCPWave Information for VU#457759

glibc vulnerable to stack buffer overflow in DNS resolver

Status

Not Affected

Vendor Statement

"The TCPWave DNS Appliances and TCPWave Sharkcage Appliances do not use a vulnerable version of glibc in the current production releases. A newer version that is scheduled for a summer release has been found vulnerable and has been patches. When the customers upgrade the existing appliances to a newer version, they will not be impacted by this vulnerability."

Vendor Information

TCPWave has provided a security advisory at the URL below:

Vendor References

http://www.tcpwave.com/security-advisory-vu457759/

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.