Lucene search

K
archlinuxArch LinuxASA-201412-21
HistoryDec 18, 2014 - 12:00 a.m.

glibc: arbitrary code execution

2014-12-1800:00:00
Arch Linux
lists.archlinux.org
17

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.107 Low

EPSS

Percentile

94.5%

  • CVE-2012-3406 (arbitrary code execution)
    The vfprintf function in stdio-common/vfprintf.c in GNU C Library does
    not "properly restrict the use of" the alloca function when allocating
    the SPECS array, which allows context-dependent attackers to bypass the
    FORTIFY_SOURCE format-string protection mechanism and cause a denial of
    service (crash) or possibly execute arbitrary code via a crafted format
    string using positional parameters and a large number of format specifiers.

  • CVE-2014-9402 (denial of service)
    The nss_dns getnetbyname function will enter an infinite loop if the DNS
    backend is activated in the system Name Service Switch configuration and
    the DNS resolver receives a positive answer while processing the network
    name.

OSVersionArchitecturePackageVersionFilename
anyanyanylib32-glibc< 2.20-5UNKNOWN
anyanyanyglibc< 2.20-5UNKNOWN

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.107 Low

EPSS

Percentile

94.5%