Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-1473

Опубликовано: 08 апр. 2015
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 6.4

Описание

The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during a risk-management decision for use of the alloca function, which might allow context-dependent attackers to cause a denial of service (segmentation violation) or overwrite memory locations beyond the stack boundary via a long line containing wide characters that are improperly handled in a wscanf call.

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

not-affected

2.19-0ubuntu6.6
lucid

not-affected

__libc_use_alloca() not present
precise

released

2.15-0ubuntu10.11
trusty

released

2.19-0ubuntu6.6
trusty/esm

not-affected

2.19-0ubuntu6.6
upstream

needed

utopic

DNE

Показывать по

РелизСтатусПримечание
devel

not-affected

2.19-15ubuntu1
esm-infra-legacy/trusty

DNE

lucid

DNE

precise

DNE

trusty

DNE

trusty/esm

DNE

upstream

needed

utopic

released

2.19-10ubuntu2.3

Показывать по

EPSS

Процентиль: 63%
0.00449
Низкий

6.4 Medium

CVSS2

Связанные уязвимости

redhat
больше 11 лет назад

The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during a risk-management decision for use of the alloca function, which might allow context-dependent attackers to cause a denial of service (segmentation violation) or overwrite memory locations beyond the stack boundary via a long line containing wide characters that are improperly handled in a wscanf call.

nvd
больше 10 лет назад

The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during a risk-management decision for use of the alloca function, which might allow context-dependent attackers to cause a denial of service (segmentation violation) or overwrite memory locations beyond the stack boundary via a long line containing wide characters that are improperly handled in a wscanf call.

msrc
3 месяца назад

Описание отсутствует

debian
больше 10 лет назад

The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka gli ...

github
около 3 лет назад

The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during a risk-management decision for use of the alloca function, which might allow context-dependent attackers to cause a denial of service (segmentation violation) or overwrite memory locations beyond the stack boundary via a long line containing wide characters that are improperly handled in a wscanf call.

EPSS

Процентиль: 63%
0.00449
Низкий

6.4 Medium

CVSS2