Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-8983

Опубликовано: 20 мар. 2017
Источник: debian
EPSS Низкий

Описание

Integer overflow in the _IO_wstr_overflow function in libio/wstrops.c in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors related to computing a size in bytes, which triggers a heap-based buffer overflow.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
eglibcremovedpackage
eglibcfixed2.13-38+deb7u9wheezypackage
glibcfixed2.21-1package
glibcfixed2.19-18+deb8u2jessiepackage

Примечания

  • https://sourceware.org/bugzilla/show_bug.cgi?id=17269

  • Fixed upstream in 2.22

  • Fixed by: https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=bdf1ff052a8e23d637f2c838fa5642d78fcedc33

  • https://www.openwall.com/lists/oss-security/2015/02/22/15

EPSS

Процентиль: 66%
0.00525
Низкий

Связанные уязвимости

CVSS3: 8.1
ubuntu
почти 9 лет назад

Integer overflow in the _IO_wstr_overflow function in libio/wstrops.c in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors related to computing a size in bytes, which triggers a heap-based buffer overflow.

redhat
почти 11 лет назад

Integer overflow in the _IO_wstr_overflow function in libio/wstrops.c in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors related to computing a size in bytes, which triggers a heap-based buffer overflow.

CVSS3: 8.1
nvd
почти 9 лет назад

Integer overflow in the _IO_wstr_overflow function in libio/wstrops.c in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors related to computing a size in bytes, which triggers a heap-based buffer overflow.

CVSS3: 8.1
github
больше 3 лет назад

Integer overflow in the _IO_wstr_overflow function in libio/wstrops.c in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors related to computing a size in bytes, which triggers a heap-based buffer overflow.

suse-cvrf
почти 4 года назад

Security update for glibc

EPSS

Процентиль: 66%
0.00525
Низкий