Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-1472

Опубликовано: 08 апр. 2015
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.5

Описание

The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during memory allocation, which allows context-dependent attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a long line containing wide characters that are improperly handled in a wscanf call.

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

released

2.19-0ubuntu6.6
lucid

not-affected

ADDW doesn't realloc
precise

released

2.15-0ubuntu10.11
trusty

released

2.19-0ubuntu6.6
trusty/esm

released

2.19-0ubuntu6.6
upstream

needed

utopic

DNE

Показывать по

РелизСтатусПримечание
devel

not-affected

2.19-15ubuntu1
esm-infra-legacy/trusty

DNE

lucid

DNE

precise

DNE

trusty

DNE

trusty/esm

DNE

upstream

needed

utopic

released

2.19-10ubuntu2.3

Показывать по

EPSS

Процентиль: 89%
0.04758
Низкий

7.5 High

CVSS2

Связанные уязвимости

redhat
больше 11 лет назад

The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during memory allocation, which allows context-dependent attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a long line containing wide characters that are improperly handled in a wscanf call.

nvd
больше 10 лет назад

The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during memory allocation, which allows context-dependent attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a long line containing wide characters that are improperly handled in a wscanf call.

debian
больше 10 лет назад

The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka gli ...

github
больше 3 лет назад

The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during memory allocation, which allows context-dependent attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a long line containing wide characters that are improperly handled in a wscanf call.

suse-cvrf
больше 10 лет назад

Security update for glibc

EPSS

Процентиль: 89%
0.04758
Низкий

7.5 High

CVSS2