CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
EPSS
Percentile
96.0%
CentOS Errata and Security Advisory CESA-2013:1605
The glibc packages provide the standard C libraries (libc), POSIX thread
libraries (libpthread), standard math libraries (libm), and the Name Server
Caching Daemon (nscd) used by multiple programs on the system. Without
these libraries, the Linux system cannot function correctly.
Multiple integer overflow flaws, leading to heap-based buffer overflows,
were found in glibc’s memory allocator functions (pvalloc, valloc, and
memalign). If an application used such a function, it could cause the
application to crash or, potentially, execute arbitrary code with the
privileges of the user running the application. (CVE-2013-4332)
A flaw was found in the regular expression matching routines that process
multibyte character input. If an application utilized the glibc regular
expression matching mechanism, an attacker could provide specially-crafted
input that, when processed, would cause the application to crash.
(CVE-2013-0242)
It was found that getaddrinfo() did not limit the amount of stack memory
used during name resolution. An attacker able to make an application
resolve an attacker-controlled hostname or IP address could possibly cause
the application to exhaust all stack memory and crash. (CVE-2013-1914)
Among other changes, this update includes an important fix for the following
bug:
These updated glibc packages also include additional bug fixes and
various enhancements. Space precludes documenting all of these changes
in this advisory. Users are directed to the Red Hat Enterprise Linux 6.5
Technical Notes, linked to in the References, for information on the
most significant of these changes.
All glibc users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues and add these
enhancements.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-cr-announce/2013-November/027217.html
Affected packages:
glibc
glibc-common
glibc-devel
glibc-headers
glibc-static
glibc-utils
nscd
Upstream details at:
https://access.redhat.com/errata/RHSA-2013:1605
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 6 | i686 | glibc | < 2.12-1.132.el6 | glibc-2.12-1.132.el6.i686.rpm |
CentOS | 6 | i686 | glibc-common | < 2.12-1.132.el6 | glibc-common-2.12-1.132.el6.i686.rpm |
CentOS | 6 | i686 | glibc-devel | < 2.12-1.132.el6 | glibc-devel-2.12-1.132.el6.i686.rpm |
CentOS | 6 | i686 | glibc-headers | < 2.12-1.132.el6 | glibc-headers-2.12-1.132.el6.i686.rpm |
CentOS | 6 | i686 | glibc-static | < 2.12-1.132.el6 | glibc-static-2.12-1.132.el6.i686.rpm |
CentOS | 6 | i686 | glibc-utils | < 2.12-1.132.el6 | glibc-utils-2.12-1.132.el6.i686.rpm |
CentOS | 6 | i686 | nscd | < 2.12-1.132.el6 | nscd-2.12-1.132.el6.i686.rpm |
CentOS | 6 | i686 | glibc | < 2.12-1.132.el6 | glibc-2.12-1.132.el6.i686.rpm |
CentOS | 6 | x86_64 | glibc | < 2.12-1.132.el6 | glibc-2.12-1.132.el6.x86_64.rpm |
CentOS | 6 | x86_64 | glibc-common | < 2.12-1.132.el6 | glibc-common-2.12-1.132.el6.x86_64.rpm |