Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-0221

Опубликовано: 23 нояб. 2013
Источник: debian
EPSS Низкий

Описание

The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the sort command, when using the (1) -d or (2) -M switch, which triggers a stack-based buffer overflow in the alloca function.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
coreutilsnot-affectedpackage

Примечания

  • https://www.openwall.com/lists/oss-security/2013/01/21/14

EPSS

Процентиль: 90%
0.06006
Низкий

Связанные уязвимости

ubuntu
больше 11 лет назад

The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the sort command, when using the (1) -d or (2) -M switch, which triggers a stack-based buffer overflow in the alloca function.

redhat
больше 12 лет назад

The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the sort command, when using the (1) -d or (2) -M switch, which triggers a stack-based buffer overflow in the alloca function.

nvd
больше 11 лет назад

The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the sort command, when using the (1) -d or (2) -M switch, which triggers a stack-based buffer overflow in the alloca function.

msrc
почти 5 лет назад

Описание отсутствует

github
больше 3 лет назад

The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the sort command, when using the (1) -d or (2) -M switch, which triggers a stack-based buffer overflow in the alloca function.

EPSS

Процентиль: 90%
0.06006
Низкий