Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-8983

Опубликовано: 20 мар. 2017
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.8
CVSS3: 8.1

Описание

Integer overflow in the _IO_wstr_overflow function in libio/wstrops.c in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors related to computing a size in bytes, which triggers a heap-based buffer overflow.

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

released

2.19-0ubuntu6.10
precise

released

2.15-0ubuntu10.16
precise/esm

not-affected

2.15-0ubuntu10.16
trusty

released

2.19-0ubuntu6.10
trusty/esm

released

2.19-0ubuntu6.10
upstream

needs-triage

vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

xenial

DNE

Показывать по

РелизСтатусПримечание
devel

not-affected

2.23-0ubuntu3
esm-infra-legacy/trusty

DNE

esm-infra/xenial

not-affected

2.23-0ubuntu3
precise

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

2.22
vivid/stable-phone-overlay

ignored

end of life
vivid/ubuntu-core

released

2.21-0ubuntu4.0.7

Показывать по

EPSS

Процентиль: 66%
0.00525
Низкий

6.8 Medium

CVSS2

8.1 High

CVSS3

Связанные уязвимости

redhat
почти 11 лет назад

Integer overflow in the _IO_wstr_overflow function in libio/wstrops.c in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors related to computing a size in bytes, which triggers a heap-based buffer overflow.

CVSS3: 8.1
nvd
почти 9 лет назад

Integer overflow in the _IO_wstr_overflow function in libio/wstrops.c in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors related to computing a size in bytes, which triggers a heap-based buffer overflow.

CVSS3: 8.1
debian
почти 9 лет назад

Integer overflow in the _IO_wstr_overflow function in libio/wstrops.c ...

CVSS3: 8.1
github
больше 3 лет назад

Integer overflow in the _IO_wstr_overflow function in libio/wstrops.c in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors related to computing a size in bytes, which triggers a heap-based buffer overflow.

suse-cvrf
почти 4 года назад

Security update for glibc

EPSS

Процентиль: 66%
0.00525
Низкий

6.8 Medium

CVSS2

8.1 High

CVSS3