PSA: glibc buffer overflow (nss_hostname_digits_dots)
![[covert-ops] bullhorn](http://www.covert-ops.org/wp-content/uploads/2014/12/co-bullhorn-sq-500-200x200.jpg)
Via https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2015-0235.
A heap-based buffer overflow was found in glibc’s __nss_hostname_digits_dots() function, which is used by the gethostbyname() and gethostbyname2() glibc function calls. A remote attacker able to make an application call either of these functions could use this flaw to execute arbitrary code with the permissions of the user running the application.
Update ALL THE THINGS! Again. Once, you know, a patch is available.

Really, really long-time readers of this site may recall its first incarnation. It was very geeky, with a *NIX motif running through it. (You can view an Internet Wayback Machine snapshot of it
I was talking about this with Jenn the last time I saw her, and it came to me again this morning, so I thought I’d share.



