Описание
Multiple stack-based buffer overflows in the GNU C Library (aka glibc or libc6) before 2.23 allow context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long argument to the (1) nan, (2) nanf, or (3) nanl function.
A stack overflow vulnerability was found in nan* functions that could cause applications, which process long strings with the nan function, to crash or, potentially, execute arbitrary code.
Меры по смягчению последствий
Do not use any applications which call the affected nan* functions. These functions are used only very rarely.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 5 | compat-glibc | Will not fix | ||
Red Hat Enterprise Linux 5 | glibc | Will not fix | ||
Red Hat Enterprise Linux 6 | compat-glibc | Will not fix | ||
Red Hat Enterprise Linux 7 | compat-glibc | Will not fix | ||
Red Hat Enterprise Linux 6 | glibc | Fixed | RHSA-2017:0680 | 21.03.2017 |
Red Hat Enterprise Linux 7 | glibc | Fixed | RHSA-2017:1916 | 01.08.2017 |
Показывать по
Дополнительная информация
Статус:
EPSS
5.1 Medium
CVSS2
Связанные уязвимости
Multiple stack-based buffer overflows in the GNU C Library (aka glibc or libc6) before 2.23 allow context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long argument to the (1) nan, (2) nanf, or (3) nanl function.
Multiple stack-based buffer overflows in the GNU C Library (aka glibc or libc6) before 2.23 allow context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long argument to the (1) nan, (2) nanf, or (3) nanl function.
Multiple stack-based buffer overflows in the GNU C Library (aka glibc ...
Multiple stack-based buffer overflows in the GNU C Library (aka glibc or libc6) before 2.23 allow context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long argument to the (1) nan, (2) nanf, or (3) nanl function.
ELSA-2017-0680: glibc security and bug fix update (MODERATE)
EPSS
5.1 Medium
CVSS2