Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-9474

Опубликовано: 16 дек. 2013
Источник: redhat
CVSS2: 1.2
EPSS Низкий

Описание

Buffer overflow in the mpfr_strtofr function in GNU MPFR before 3.1.2-p11 allows context-dependent attackers to have unspecified impact via vectors related to incorrect documentation for mpn_set_str.

Отчет

Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6mpfrWill not fix
Red Hat Enterprise Linux 7 Extended Lifecycle SupportmpfrFixedRHSA-2025:933223.06.2025

Показывать по

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=1171701mpfr: buffer overflow in mpfr_strtofr

EPSS

Процентиль: 90%
0.06126
Низкий

1.2 Low

CVSS2

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 8 лет назад

Buffer overflow in the mpfr_strtofr function in GNU MPFR before 3.1.2-p11 allows context-dependent attackers to have unspecified impact via vectors related to incorrect documentation for mpn_set_str.

CVSS3: 9.8
nvd
почти 8 лет назад

Buffer overflow in the mpfr_strtofr function in GNU MPFR before 3.1.2-p11 allows context-dependent attackers to have unspecified impact via vectors related to incorrect documentation for mpn_set_str.

CVSS3: 9.8
debian
почти 8 лет назад

Buffer overflow in the mpfr_strtofr function in GNU MPFR before 3.1.2- ...

CVSS3: 9.8
github
около 3 лет назад

Buffer overflow in the mpfr_strtofr function in GNU MPFR before 3.1.2-p11 allows context-dependent attackers to have unspecified impact via vectors related to incorrect documentation for mpn_set_str.

oracle-oval
29 дней назад

ELSA-2025-9332: mpfr security update (IMPORTANT)

EPSS

Процентиль: 90%
0.06126
Низкий

1.2 Low

CVSS2