From de66b977e0aa07b0f3a5344366fdf43028a5cfdc Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 12 Apr 2018 10:03:54 -0400 Subject: [PATCH] - Synchronized data. --- 2017/12xxx/CVE-2017-12133.json | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/2017/12xxx/CVE-2017-12133.json b/2017/12xxx/CVE-2017-12133.json index 917616e3500..e044717d276 100644 --- a/2017/12xxx/CVE-2017-12133.json +++ b/2017/12xxx/CVE-2017-12133.json @@ -34,7 +34,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "The DNS stub resolver in the GNU C Library (glibc) before version 2.26, when EDNS support is enabled, will solicit large UDP responses from name servers, potentially simplifying off-path DNS spoofing attackers due to IP fragmentation." + "value" : "Use-after-free vulnerability in the clntudp_call function in sunrpc/clnt_udp.c in the GNU C Library (aka glibc or libc6) before 2.26 allows remote attackers to have unspecified impact via vectors related to error path." } ] }, @@ -66,6 +66,11 @@ "name" : "FEDORA-2017-270ab2baa3", "refsource" : "FEDORA", "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYZL6PAKI73XYRJYL5VLDGA4FFGWMB7A/" + }, + { + "name" : "100679", + "refsource" : "BID", + "url" : "https://www.securityfocus.com/bid/100679" } ] }