Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-x2p4-f3vf-gwp3

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arguments.

Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arguments.

EPSS

Процентиль: 83%
0.02114
Низкий

Связанные уязвимости

ubuntu
больше 12 лет назад

Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arguments.

redhat
почти 15 лет назад

Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arguments.

nvd
больше 12 лет назад

Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arguments.

debian
больше 12 лет назад

Integer overflow in the vfprintf function in stdio-common/vfprintf.c i ...

oracle-oval
больше 13 лет назад

ELSA-2012-0397: glibc security update (MODERATE)

EPSS

Процентиль: 83%
0.02114
Низкий