Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2011-1659

Опубликовано: 05 авг. 2010
Источник: redhat
CVSS2: 5.1
EPSS Низкий

Описание

Integer overflow in posix/fnmatch.c in the GNU C Library (aka glibc or libc6) 2.13 and earlier allows context-dependent attackers to cause a denial of service (application crash) via a long UTF8 string that is used in an fnmatch call with a crafted pattern argument, a different vulnerability than CVE-2011-1071.

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=681054glibc: fnmatch() alloca()-based memory corruption flaw

EPSS

Процентиль: 85%
0.02476
Низкий

5.1 Medium

CVSS2

Связанные уязвимости

ubuntu
около 14 лет назад

Integer overflow in posix/fnmatch.c in the GNU C Library (aka glibc or libc6) 2.13 and earlier allows context-dependent attackers to cause a denial of service (application crash) via a long UTF8 string that is used in an fnmatch call with a crafted pattern argument, a different vulnerability than CVE-2011-1071.

nvd
около 14 лет назад

Integer overflow in posix/fnmatch.c in the GNU C Library (aka glibc or libc6) 2.13 and earlier allows context-dependent attackers to cause a denial of service (application crash) via a long UTF8 string that is used in an fnmatch call with a crafted pattern argument, a different vulnerability than CVE-2011-1071.

debian
около 14 лет назад

Integer overflow in posix/fnmatch.c in the GNU C Library (aka glibc or ...

github
около 3 лет назад

Integer overflow in posix/fnmatch.c in the GNU C Library (aka glibc or libc6) 2.13 and earlier allows context-dependent attackers to cause a denial of service (application crash) via a long UTF8 string that is used in an fnmatch call with a crafted pattern argument, a different vulnerability than CVE-2011-1071.

oracle-oval
около 14 лет назад

ELSA-2011-0413: glibc security update (IMPORTANT)

EPSS

Процентиль: 85%
0.02476
Низкий

5.1 Medium

CVSS2