Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2005-3590

Опубликовано: 10 апр. 2019
Источник: debian
EPSS Низкий

Описание

The getgrouplist function in the GNU C library (glibc) before version 2.3.5, when invoked with a zero argument, writes to the passed pointer even if the specified array size is zero, leading to a buffer overflow and potentially allowing attackers to corrupt memory.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
glibcfixed2.3.5-3package

Примечания

  • https://sourceware.org/bugzilla/show_bug.cgi?id=661

EPSS

Процентиль: 65%
0.00492
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 6 лет назад

The getgrouplist function in the GNU C library (glibc) before version 2.3.5, when invoked with a zero argument, writes to the passed pointer even if the specified array size is zero, leading to a buffer overflow and potentially allowing attackers to corrupt memory.

CVSS3: 5.6
redhat
больше 6 лет назад

The getgrouplist function in the GNU C library (glibc) before version 2.3.5, when invoked with a zero argument, writes to the passed pointer even if the specified array size is zero, leading to a buffer overflow and potentially allowing attackers to corrupt memory.

CVSS3: 9.8
nvd
больше 6 лет назад

The getgrouplist function in the GNU C library (glibc) before version 2.3.5, when invoked with a zero argument, writes to the passed pointer even if the specified array size is zero, leading to a buffer overflow and potentially allowing attackers to corrupt memory.

CVSS3: 9.8
github
больше 3 лет назад

The getgrouplist function in the GNU C library (glibc) before version 2.3.5, when invoked with a zero argument, writes to the passed pointer even if the specified array size is zero, leading to a buffer overflow and potentially allowing attackers to corrupt memory.

EPSS

Процентиль: 65%
0.00492
Низкий