Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-8778

Опубликовано: 19 апр. 2016
Источник: debian

Описание

Integer overflow in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via the size argument to the __hcreate_r function, which triggers out-of-bounds heap-memory access.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
glibcfixed2.21-8package
eglibcremovedpackage

Примечания

  • https://sourceware.org/bugzilla/show_bug.cgi?id=18240

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 10 лет назад

Integer overflow in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via the size argument to the __hcreate_r function, which triggers out-of-bounds heap-memory access.

CVSS3: 8.1
redhat
почти 11 лет назад

Integer overflow in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via the size argument to the __hcreate_r function, which triggers out-of-bounds heap-memory access.

CVSS3: 9.8
nvd
почти 10 лет назад

Integer overflow in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via the size argument to the __hcreate_r function, which triggers out-of-bounds heap-memory access.

CVSS3: 9.8
github
больше 3 лет назад

Integer overflow in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via the size argument to the __hcreate_r function, which triggers out-of-bounds heap-memory access.

oracle-oval
почти 9 лет назад

ELSA-2017-0680: glibc security and bug fix update (MODERATE)