Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2023-25139

Опубликовано: 03 фев. 2023
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 9.8

Описание

sprintf in the GNU C Library (glibc) 2.37 has a buffer overflow (out-of-bounds write) in some situations with a correct buffer size. This is unrelated to CWE-676. It may write beyond the bounds of the destination buffer when attempting to write a padded, thousands-separated string representation of a number, if the buffer is allocated the exact size required to represent that number as a string. For example, 1,234,567 (with padding to 13) overflows by two bytes.

РелизСтатусПримечание
bionic

DNE

esm-infra-legacy/trusty

not-affected

code not present
esm-infra/focal

DNE

focal

DNE

jammy

DNE

kinetic

DNE

trusty

ignored

end of standard support
trusty/esm

not-affected

code not present
upstream

needs-triage

xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

not-affected

code not present
devel

released

2.37-0ubuntu2
esm-infra/bionic

not-affected

code not present
esm-infra/focal

not-affected

code not present
esm-infra/xenial

not-affected

code not present
focal

not-affected

code not present
jammy

not-affected

code not present
kinetic

not-affected

code not present
lunar

released

2.37-0ubuntu2
trusty

ignored

end of standard support

Показывать по

Ссылки на источники

EPSS

Процентиль: 35%
0.00144
Низкий

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 7.5
redhat
больше 2 лет назад

sprintf in the GNU C Library (glibc) 2.37 has a buffer overflow (out-of-bounds write) in some situations with a correct buffer size. This is unrelated to CWE-676. It may write beyond the bounds of the destination buffer when attempting to write a padded, thousands-separated string representation of a number, if the buffer is allocated the exact size required to represent that number as a string. For example, 1,234,567 (with padding to 13) overflows by two bytes.

CVSS3: 9.8
nvd
больше 2 лет назад

sprintf in the GNU C Library (glibc) 2.37 has a buffer overflow (out-of-bounds write) in some situations with a correct buffer size. This is unrelated to CWE-676. It may write beyond the bounds of the destination buffer when attempting to write a padded, thousands-separated string representation of a number, if the buffer is allocated the exact size required to represent that number as a string. For example, 1,234,567 (with padding to 13) overflows by two bytes.

CVSS3: 9.8
debian
больше 2 лет назад

sprintf in the GNU C Library (glibc) 2.37 has a buffer overflow (out-o ...

CVSS3: 9.8
github
больше 2 лет назад

sprintf in the GNU C Library (glibc) 2.37 has a buffer overflow (out-of-bounds write) in some situations with a correct buffer size. This is unrelated to CWE-676. It may write beyond the bounds of the destination buffer when attempting to write a padded, thousands-separated string representation of a number, if the buffer is allocated the exact size required to represent that number as a string. For example, 1,234,567 (with padding to 13) overflows by two bytes.

CVSS3: 9.8
fstec
больше 2 лет назад

Уязвимость функции sprintf библиотеки GNU C (glibc), позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 35%
0.00144
Низкий

9.8 Critical

CVSS3