Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-4043

Опубликовано: 11 июн. 2014
Источник: redhat
CVSS2: 1
EPSS Низкий

Описание

The posix_spawn_file_actions_addopen function in glibc before 2.20 does not copy its path argument in accordance with the POSIX specification, which allows context-dependent attackers to trigger use-after-free vulnerabilities.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 4glibcWill not fix
Red Hat Enterprise Linux 5glibcWill not fix
Red Hat Enterprise Linux 6glibcWill not fix
Red Hat Enterprise Linux 7glibcWill not fix

Показывать по

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=1109263glibc: posix_spawn_file_actions_addopen fails to copy the path argument

EPSS

Процентиль: 82%
0.01643
Низкий

1 Low

CVSS2

Связанные уязвимости

ubuntu
больше 11 лет назад

The posix_spawn_file_actions_addopen function in glibc before 2.20 does not copy its path argument in accordance with the POSIX specification, which allows context-dependent attackers to trigger use-after-free vulnerabilities.

nvd
больше 11 лет назад

The posix_spawn_file_actions_addopen function in glibc before 2.20 does not copy its path argument in accordance with the POSIX specification, which allows context-dependent attackers to trigger use-after-free vulnerabilities.

debian
больше 11 лет назад

The posix_spawn_file_actions_addopen function in glibc before 2.20 doe ...

github
больше 3 лет назад

The posix_spawn_file_actions_addopen function in glibc before 2.20 does not copy its path argument in accordance with the POSIX specification, which allows context-dependent attackers to trigger use-after-free vulnerabilities.

suse-cvrf
больше 11 лет назад

Security update for glibc

EPSS

Процентиль: 82%
0.01643
Низкий

1 Low

CVSS2