Описание
Integer overflow in the __tzfile_read function in glibc before 2.15 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted timezone (TZ) file, as demonstrated using vsftpd.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 3 | compat-glibc | Affected | ||
Red Hat Enterprise Linux 3 | glibc | Affected | ||
Red Hat Enterprise Linux 4 | compat-glibc | Affected | ||
Red Hat Enterprise Linux 5 | compat-glibc | Affected | ||
Red Hat Enterprise Linux 6 | compat-glibc | Affected | ||
Red Hat Enterprise Linux 4 | glibc | Fixed | RHSA-2012:0125 | 13.02.2012 |
Red Hat Enterprise Linux 5 | glibc | Fixed | RHSA-2012:0126 | 13.02.2012 |
Red Hat Enterprise Linux 6 | glibc | Fixed | RHSA-2012:0058 | 24.01.2012 |
Показывать по
Дополнительная информация
Статус:
6.5 Medium
CVSS2
Связанные уязвимости
Integer overflow in the __tzfile_read function in glibc before 2.15 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted timezone (TZ) file, as demonstrated using vsftpd.
Integer overflow in the __tzfile_read function in glibc before 2.15 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted timezone (TZ) file, as demonstrated using vsftpd.
Integer overflow in the __tzfile_read function in glibc before 2.15 al ...
Integer overflow in the __tzfile_read function in glibc before 2.15 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted timezone (TZ) file, as demonstrated using vsftpd.
ELSA-2012-0058: glibc security and bug fix update (MODERATE)
6.5 Medium
CVSS2