Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-8779

Опубликовано: 19 апр. 2016
Источник: debian
EPSS Низкий

Описание

Stack-based buffer overflow in the catopen function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long catalog name.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
glibcfixed2.21-7package
eglibcremovedpackage

Примечания

  • https://sourceware.org/bugzilla/show_bug.cgi?id=17905#c0

EPSS

Процентиль: 89%
0.04971
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 9 лет назад

Stack-based buffer overflow in the catopen function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long catalog name.

redhat
больше 10 лет назад

Stack-based buffer overflow in the catopen function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long catalog name.

CVSS3: 9.8
nvd
больше 9 лет назад

Stack-based buffer overflow in the catopen function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long catalog name.

CVSS3: 9.8
github
больше 3 лет назад

Stack-based buffer overflow in the catopen function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long catalog name.

oracle-oval
больше 8 лет назад

ELSA-2017-0680: glibc security and bug fix update (MODERATE)

EPSS

Процентиль: 89%
0.04971
Низкий