TCPWave Information for VU#457759
glibc vulnerable to stack buffer overflow in DNS resolver
- Vendor Information Help Date Notified:
- Statement Date: 18 Feb 2016
- Date Updated: 18 Feb 2016
"The TCPWave DNS Appliances and TCPWave Sharkcage Appliances do not use a vulnerable version of glibc in the current production releases. A newer version that is scheduled for a summer release has been found vulnerable and has been patches. When the customers upgrade the existing appliances to a newer version, they will not be impacted by this vulnerability."
TCPWave has provided a security advisory at the URL below:
There are no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us email.