Описание
Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arguments.
Релиз | Статус | Примечание |
---|---|---|
devel | released | 2.15-0ubuntu6 |
hardy | DNE | |
lucid | released | 2.11.1-0ubuntu7.10 |
maverick | released | 2.12.1-0ubuntu10.4 |
natty | released | 2.13-0ubuntu13.1 |
oneiric | released | 2.13-20ubuntu5.1 |
upstream | needs-triage |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
hardy | released | 2.7-10ubuntu8.1 |
lucid | DNE | |
maverick | DNE | |
natty | DNE | |
oneiric | DNE | |
upstream | needs-triage |
Показывать по
EPSS
6.8 Medium
CVSS2
Связанные уязвимости
Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arguments.
Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arguments.
Integer overflow in the vfprintf function in stdio-common/vfprintf.c i ...
Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arguments.
EPSS
6.8 Medium
CVSS2