Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2013-4332

Опубликовано: 20 авг. 2013
Источник: redhat
CVSS2: 4.4
EPSS Низкий

Описание

Multiple integer overflows in malloc/malloc.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allow context-dependent attackers to cause a denial of service (heap corruption) via a large value to the (1) pvalloc, (2) valloc, (3) posix_memalign, (4) memalign, or (5) aligned_alloc functions.

Multiple integer overflow flaws, leading to heap-based buffer overflows, were found in glibc's memory allocator functions (pvalloc, valloc, and memalign). If an application used such a function, it could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7glibcNot affected
Red Hat Enterprise Linux 5glibcFixedRHSA-2013:141108.10.2013
Red Hat Enterprise Linux 6glibcFixedRHSA-2013:160520.11.2013

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-190
https://bugzilla.redhat.com/show_bug.cgi?id=1007545glibc: three integer overflows in memory allocator

EPSS

Процентиль: 81%
0.01634
Низкий

4.4 Medium

CVSS2

Связанные уязвимости

ubuntu
почти 12 лет назад

Multiple integer overflows in malloc/malloc.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allow context-dependent attackers to cause a denial of service (heap corruption) via a large value to the (1) pvalloc, (2) valloc, (3) posix_memalign, (4) memalign, or (5) aligned_alloc functions.

nvd
почти 12 лет назад

Multiple integer overflows in malloc/malloc.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allow context-dependent attackers to cause a denial of service (heap corruption) via a large value to the (1) pvalloc, (2) valloc, (3) posix_memalign, (4) memalign, or (5) aligned_alloc functions.

debian
почти 12 лет назад

Multiple integer overflows in malloc/malloc.c in the GNU C Library (ak ...

github
больше 3 лет назад

Multiple integer overflows in malloc/malloc.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allow context-dependent attackers to cause a denial of service (heap corruption) via a large value to the (1) pvalloc, (2) valloc, (3) posix_memalign, (4) memalign, or (5) aligned_alloc functions.

oracle-oval
почти 12 лет назад

ELSA-2013-1411: glibc security and bug fix update (MODERATE)

EPSS

Процентиль: 81%
0.01634
Низкий

4.4 Medium

CVSS2