Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2011-2702

Опубликовано: 27 окт. 2014
Источник: ubuntu
Приоритет: medium
CVSS2: 6.8

Описание

Integer signedness error in Glibc before 2.13 and eglibc before 2.13, when using Supplemental Streaming SIMD Extensions 3 (SSSE3) optimization, allows context-dependent attackers to execute arbitrary code via a negative length parameter to (1) memcpy-ssse3-rep.S, (2) memcpy-ssse3.S, or (3) memset-sse2.S in sysdeps/i386/i686/multiarch/, which triggers an out-of-bounds read, as demonstrated using the memcpy function.

РелизСтатусПримечание
devel

not-affected

hardy

DNE

lucid

released

2.11.1-0ubuntu7.10
maverick

not-affected

natty

not-affected

oneiric

not-affected

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

not-affected

code-not-present
lucid

DNE

maverick

DNE

natty

DNE

oneiric

DNE

upstream

needs-triage

Показывать по

6.8 Medium

CVSS2

Связанные уязвимости

nvd
около 11 лет назад

Integer signedness error in Glibc before 2.13 and eglibc before 2.13, when using Supplemental Streaming SIMD Extensions 3 (SSSE3) optimization, allows context-dependent attackers to execute arbitrary code via a negative length parameter to (1) memcpy-ssse3-rep.S, (2) memcpy-ssse3.S, or (3) memset-sse2.S in sysdeps/i386/i686/multiarch/, which triggers an out-of-bounds read, as demonstrated using the memcpy function.

debian
около 11 лет назад

Integer signedness error in Glibc before 2.13 and eglibc before 2.13, ...

github
больше 3 лет назад

Integer signedness error in Glibc before 2.13 and eglibc before 2.13, when using Supplemental Streaming SIMD Extensions 3 (SSSE3) optimization, allows context-dependent attackers to execute arbitrary code via a negative length parameter to (1) memcpy-ssse3-rep.S, (2) memcpy-ssse3.S, or (3) memset-sse2.S in sysdeps/i386/i686/multiarch/, which triggers an out-of-bounds read, as demonstrated using the memcpy function.

6.8 Medium

CVSS2