CVE-2014-9402
Description
The nss_dns implementation of getnetbyname in GNU C Library (aka glibc) before 2.21, when the DNS backend in the Name Service Switch configuration is enabled, allows remote attackers to cause a denial of service (infinite loop) by sending a positive answer while a network name is being process.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In glibc before 2.21, the getnetbyname function in the nss_dns backend can enter an infinite loop when processing a DNS positive answer, enabling remote denial of service.
Vulnerability
The nss_dns implementation of getnetbyname() in the GNU C Library (glibc) before version 2.21 contains a flaw that can cause an infinite loop. The bug is present in the DNS backend when the Name Service Switch (NSS) configuration is set to use DNS for network name resolution. When a DNS positive answer is received while a network name is being processed, the function fails to correctly handle the response, leading to a non-terminating loop. All glibc versions prior to 2.21 are affected [1].
Exploitation
An attacker who can send a crafted DNS positive answer to a target system can trigger this vulnerability. No authentication is required, and the attacker only needs network access to send malicious DNS responses to the victim, which may be on the same network or via the internet if the system uses an external resolver. The attack is triggered when the target's getnetbyname() function processes the attacker-controlled DNS response during network name resolution.
Impact
Successful exploitation leads to a denial of service (DoS) condition. The affected function enters an infinite loop, causing the application or process that invoked it to hang indefinitely. This can disrupt services that rely on network name resolution, potentially making the system unresponsive to certain network operations. The loop does not provide code execution or privilege escalation, but it can be used to degrade or disable network functionality.
Mitigation
The vulnerability is fixed in glibc version 2.21 and later. Red Hat Enterprise Linux 7 received an updated package via RHSA-2018:0805, which upgrades glibc to version 2.17-222 that includes the fix [1]. Users should update their glibc packages to the patched versions. If upgrading is not immediately possible, disabling the DNS backend for network name resolution in the NSS configuration may reduce exposure, though this may impact network functionality. No workaround is provided in the available references [1].
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
13cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*+ 3 more
- cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
- Range: <2.21
- osv-coords5 versionspkg:rpm/opensuse/glibc&distro=openSUSE%20Tumbleweedpkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Desktop%2012pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%2012pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012
< 2.24-2.3+ 4 more
- (no CPE)range: < 2.24-2.3
- (no CPE)range: < 2.19-20.3
- (no CPE)range: < 2.19-20.3
- (no CPE)range: < 2.19-20.3
- (no CPE)range: < 2.19-20.3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
14- sourceware.org/bugzilla/show_bug.cginvdExploit
- lists.opensuse.org/opensuse-updates/2015-02/msg00089.htmlnvd
- packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.htmlnvd
- packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.htmlnvd
- seclists.org/fulldisclosure/2019/Jun/18nvd
- seclists.org/fulldisclosure/2019/Sep/7nvd
- www.openwall.com/lists/oss-security/2014/12/18/1nvd
- www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.htmlnvd
- www.securityfocus.com/bid/71670nvd
- www.ubuntu.com/usn/USN-2519-1nvd
- access.redhat.com/errata/RHSA-2018:0805nvd
- seclists.org/bugtraq/2019/Jun/14nvd
- seclists.org/bugtraq/2019/Sep/7nvd
- security.gentoo.org/glsa/201602-02nvd
News mentions
0No linked articles in our index yet.