Hello,
Following our previous communication concerning the announcements of OpenSSL vulnerability (CVE-2016-0701) and Cisco's ASA IKE Buffer Overflow (CVE-2016-1287), a new security vulnerability surfaced which targets systems that use the "GNU Library C (glbic)" (including Cisco, Juniper and many others).
"The glibc DNS client side resolver is vulnerable to a stack-based buffer overflow when the getaddrinfo() library function is used. Software using this function may be exploited with attacker-controlled domain names, attacker-controlled DNS servers, or through a man-in-the-middle attack." source
Below is a proof of concept presented by Dan Kaminsky targeting JavaScript, Python, Java, and Haskell:
The Glibc is widely used across countless applications, and Networking vendors are affected by this vulnerability, in response they published links detailing the impact on their products:
Cisco
|
|
F5
|
|
Juniper
|
|
EMC
|
|
Bluecoat
|
We recommend taking a quick action in this regards in order not to keep your system vulnerable to a potential attack or compromise.
If you would like us to check this vulnerability's effect on your network and help you patch your devices, you are kindly requested to open a case on Data Consult hotline +961-1-511822.
--
Elie Bassil
EmoticonEmoticon