Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-8982

Опубликовано: 15 мар. 2017
Источник: debian
EPSS Низкий

Описание

Integer overflow in the strxfrm function in the GNU C Library (aka glibc or libc6) before 2.21 allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string, which triggers a stack-based buffer overflow.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
glibcfixed2.21-1package
glibcfixed2.19-18+deb8u2jessiepackage
eglibcremovedpackage
eglibcfixed2.13-38+deb7u9wheezypackage
eglibcfixed2.11.3-4+deb6u8squeezepackage

Примечания

  • workaround entry for DLA-350-1 until/if CVE assigned

  • https://sourceware.org/bugzilla/show_bug.cgi?id=16009

  • https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=0f9e585480ed

  • http://openwall.com/lists/oss-security/2015/09/08/2

EPSS

Процентиль: 79%
0.0131
Низкий

Связанные уязвимости

CVSS3: 8.1
ubuntu
почти 9 лет назад

Integer overflow in the strxfrm function in the GNU C Library (aka glibc or libc6) before 2.21 allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string, which triggers a stack-based buffer overflow.

redhat
почти 11 лет назад

Integer overflow in the strxfrm function in the GNU C Library (aka glibc or libc6) before 2.21 allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string, which triggers a stack-based buffer overflow.

CVSS3: 8.1
nvd
почти 9 лет назад

Integer overflow in the strxfrm function in the GNU C Library (aka glibc or libc6) before 2.21 allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string, which triggers a stack-based buffer overflow.

CVSS3: 8.1
github
больше 3 лет назад

Integer overflow in the strxfrm function in the GNU C Library (aka glibc or libc6) before 2.21 allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string, which triggers a stack-based buffer overflow.

fstec
почти 9 лет назад

Уязвимость библиотеки, обеспечивающей системные вызовы и основные функции glibc, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код

EPSS

Процентиль: 79%
0.0131
Низкий