Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2013-0221

Опубликовано: 15 янв. 2013
Источник: redhat
CVSS2: 2.1

Описание

The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the sort command, when using the (1) -d or (2) -M switch, which triggers a stack-based buffer overflow in the alloca function.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5coreutilsWill not fix
Red Hat Enterprise Linux 6coreutilsFixedRHSA-2013:165220.11.2013

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-391->CWE-665
https://bugzilla.redhat.com/show_bug.cgi?id=903464coreutils: segfault in "sort -d" and "sort -M" with long line input

2.1 Low

CVSS2

Связанные уязвимости

ubuntu
больше 11 лет назад

The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the sort command, when using the (1) -d or (2) -M switch, which triggers a stack-based buffer overflow in the alloca function.

nvd
больше 11 лет назад

The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the sort command, when using the (1) -d or (2) -M switch, which triggers a stack-based buffer overflow in the alloca function.

msrc
почти 5 лет назад

Описание отсутствует

debian
больше 11 лет назад

The SUSE coreutils-i18n.patch for GNU coreutils allows context-depende ...

github
больше 3 лет назад

The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the sort command, when using the (1) -d or (2) -M switch, which triggers a stack-based buffer overflow in the alloca function.

2.1 Low

CVSS2