Buffer overflow in the gethostbyname_r and other unspecified NSS functions in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response, which triggers a call with a misaligned buffer.
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- https://github.com/ARPSyndicate/cvemon
- https://github.com/AtokTajuddin/BOAR_Project