Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-9761

Опубликовано: 19 апр. 2016
Источник: debian
EPSS Низкий

Описание

Multiple stack-based buffer overflows in the GNU C Library (aka glibc or libc6) before 2.23 allow context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long argument to the (1) nan, (2) nanf, or (3) nanl function.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
glibcfixed2.23-1package
eglibcremovedpackage
eglibcno-dsawheezypackage

Примечания

  • https://sourceware.org/bugzilla/show_bug.cgi?id=16962

  • https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=e02cabecf0d025ec4f4ddee290bdf7aadb873bb3

  • https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=8f5e8b01a1da2a207228f2072c934fa5918554b8

  • Fixed for 2.23 upstream

EPSS

Процентиль: 85%
0.02444
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 9 лет назад

Multiple stack-based buffer overflows in the GNU C Library (aka glibc or libc6) before 2.23 allow context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long argument to the (1) nan, (2) nanf, or (3) nanl function.

redhat
больше 11 лет назад

Multiple stack-based buffer overflows in the GNU C Library (aka glibc or libc6) before 2.23 allow context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long argument to the (1) nan, (2) nanf, or (3) nanl function.

CVSS3: 9.8
nvd
больше 9 лет назад

Multiple stack-based buffer overflows in the GNU C Library (aka glibc or libc6) before 2.23 allow context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long argument to the (1) nan, (2) nanf, or (3) nanl function.

CVSS3: 9.8
github
больше 3 лет назад

Multiple stack-based buffer overflows in the GNU C Library (aka glibc or libc6) before 2.23 allow context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long argument to the (1) nan, (2) nanf, or (3) nanl function.

oracle-oval
больше 8 лет назад

ELSA-2017-0680: glibc security and bug fix update (MODERATE)

EPSS

Процентиль: 85%
0.02444
Низкий