Описание
Stack-based buffer overflow in the catopen function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long catalog name.
A stack based buffer overflow vulnerability was found in the catopen() function. An excessively long string passed to the function could cause it to crash or, potentially, execute arbitrary code.
Меры по смягчению последствий
Do not use applications which call catopen with unbounded strings. The catopen function is rarely used. Typical application usage involves passing a short, constant string to catopen, so most applications are not affect even if they call catopen.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 5 | compat-glibc | Will not fix | ||
Red Hat Enterprise Linux 5 | glibc | Will not fix | ||
Red Hat Enterprise Linux 6 | compat-glibc | Will not fix | ||
Red Hat Enterprise Linux 7 | compat-glibc | Will not fix | ||
Red Hat Enterprise Linux 6 | glibc | Fixed | RHSA-2017:0680 | 21.03.2017 |
Red Hat Enterprise Linux 7 | glibc | Fixed | RHSA-2017:1916 | 01.08.2017 |
Показывать по
Дополнительная информация
Статус:
EPSS
5.1 Medium
CVSS2
Связанные уязвимости
Stack-based buffer overflow in the catopen function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long catalog name.
Stack-based buffer overflow in the catopen function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long catalog name.
Stack-based buffer overflow in the catopen function in the GNU C Libra ...
Stack-based buffer overflow in the catopen function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long catalog name.
ELSA-2017-0680: glibc security and bug fix update (MODERATE)
EPSS
5.1 Medium
CVSS2