Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-0223

Опубликовано: 23 нояб. 2013
Источник: debian
EPSS Низкий

Описание

The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the join command, when using the -i switch, which triggers a stack-based buffer overflow in the alloca function.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
coreutilsnot-affectedpackage

Примечания

  • https://www.openwall.com/lists/oss-security/2013/01/21/14

EPSS

Процентиль: 35%
0.00141
Низкий

Связанные уязвимости

ubuntu
больше 11 лет назад

The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the join command, when using the -i switch, which triggers a stack-based buffer overflow in the alloca function.

redhat
больше 12 лет назад

The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the join command, when using the -i switch, which triggers a stack-based buffer overflow in the alloca function.

nvd
больше 11 лет назад

The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the join command, when using the -i switch, which triggers a stack-based buffer overflow in the alloca function.

msrc
почти 5 лет назад

Описание отсутствует

github
больше 3 лет назад

The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the join command, when using the -i switch, which triggers a stack-based buffer overflow in the alloca function.

EPSS

Процентиль: 35%
0.00141
Низкий