Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2012-4424

Опубликовано: 09 окт. 2013
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 5.1

Описание

Stack-based buffer overflow in string/strcoll_l.c in the GNU C Library (aka glibc or libc6) 2.17 and earlier allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string that triggers a malloc failure and use of the alloca function.

РелизСтатусПримечание
devel

released

2.17-93ubuntu2
hardy

DNE

lucid

released

2.11.1-0ubuntu7.13
natty

ignored

end of life
oneiric

ignored

end of life
precise

released

2.15-0ubuntu10.5
quantal

released

2.15-0ubuntu20.2
raring

released

2.17-0ubuntu5.1
saucy

released

2.17-93ubuntu2
upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

ignored

end of life
lucid

DNE

natty

DNE

oneiric

DNE

precise

DNE

quantal

DNE

raring

DNE

saucy

DNE

upstream

needs-triage

Показывать по

EPSS

Процентиль: 69%
0.00608
Низкий

5.1 Medium

CVSS2

Связанные уязвимости

redhat
больше 13 лет назад

Stack-based buffer overflow in string/strcoll_l.c in the GNU C Library (aka glibc or libc6) 2.17 and earlier allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string that triggers a malloc failure and use of the alloca function.

nvd
больше 12 лет назад

Stack-based buffer overflow in string/strcoll_l.c in the GNU C Library (aka glibc or libc6) 2.17 and earlier allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string that triggers a malloc failure and use of the alloca function.

debian
больше 12 лет назад

Stack-based buffer overflow in string/strcoll_l.c in the GNU C Library ...

github
больше 3 лет назад

Stack-based buffer overflow in string/strcoll_l.c in the GNU C Library (aka glibc or libc6) 2.17 and earlier allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string that triggers a malloc failure and use of the alloca function.

EPSS

Процентиль: 69%
0.00608
Низкий

5.1 Medium

CVSS2