Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-x2p4-f3vf-gwp3

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arguments.

Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arguments.

EPSS

Процентиль: 86%
0.03036
Низкий

Связанные уязвимости

ubuntu
почти 13 лет назад

Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arguments.

redhat
около 15 лет назад

Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arguments.

nvd
почти 13 лет назад

Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arguments.

debian
почти 13 лет назад

Integer overflow in the vfprintf function in stdio-common/vfprintf.c i ...

oracle-oval
почти 14 лет назад

ELSA-2012-0397: glibc security update (MODERATE)

EPSS

Процентиль: 86%
0.03036
Низкий