Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2012-0864

Опубликовано: 17 нояб. 2010
Источник: redhat
CVSS2: 6.8
EPSS Низкий

Описание

Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arguments.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 4glibcWill not fix
Red Hat Enterprise Linux 5glibcFixedRHSA-2012:039719.03.2012
Red Hat Enterprise Linux 6glibcFixedRHSA-2012:039315.03.2012
RHEV 3.X Hypervisor and Agents for RHEL-6rhev-hypervisor6FixedRHSA-2012:053130.04.2012

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-190
https://bugzilla.redhat.com/show_bug.cgi?id=794766glibc: FORTIFY_SOURCE format string protection bypass via "nargs" integer overflow

EPSS

Процентиль: 83%
0.02114
Низкий

6.8 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 12 лет назад

Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arguments.

nvd
больше 12 лет назад

Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arguments.

debian
больше 12 лет назад

Integer overflow in the vfprintf function in stdio-common/vfprintf.c i ...

github
больше 3 лет назад

Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arguments.

oracle-oval
больше 13 лет назад

ELSA-2012-0397: glibc security update (MODERATE)

EPSS

Процентиль: 83%
0.02114
Низкий

6.8 Medium

CVSS2