Lucene search

K
GnuGlibc

149 matches found

CVE
CVE
added 2011/01/13 7:0 p.m.88 views

CVE-2010-4052

Stack consumption vulnerability in the regcomp implementation in the GNU C Library (aka glibc or libc6) through 2.11.3, and 2.12.x through 2.12.2, allows context-dependent attackers to cause a denial of service (resource exhaustion) via a regular expression containing adjacent repetition operators,...

5CVSS8.7AI score0.09951EPSS
CVE
CVE
added 2011/04/08 3:17 p.m.87 views

CVE-2011-0536

Multiple untrusted search path vulnerabilities in elf/dl-object.c in certain modified versions of the GNU C Library (aka glibc or libc6), including glibc-2.5-49.el5_5.6 and glibc-2.12-1.7.el6_0.3 in Red Hat Enterprise Linux, allow local users to gain privileges via a crafted dynamic shared object (...

6.9CVSS8.3AI score0.05524EPSS
CVE
CVE
added 2015/08/26 7:59 p.m.87 views

CVE-2013-7424

The getaddrinfo function in glibc before 2.15, when compiled with libidn and the AI_IDN flag is used, allows context-dependent attackers to cause a denial of service (invalid free) and possibly execute arbitrary code via unspecified vectors, as demonstrated by an internationalized domain name to pi...

5.1CVSS7.8AI score0.00794EPSS
CVE
CVE
added 2017/03/20 4:59 p.m.87 views

CVE-2015-8983

Integer overflow in the _IO_wstr_overflow function in libio/wstrops.c in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors related to computing a size in bytes, which ...

8.1CVSS8AI score0.00647EPSS
CVE
CVE
added 2016/06/10 3:59 p.m.87 views

CVE-2016-3706

Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in the GNU C Library (aka glibc or libc6) allows remote attackers to cause a denial of service (crash) via vectors involving hostent conversion. NOTE: this vulnerability exists because of an incomplete fix for CV...

7.5CVSS7.5AI score0.03156EPSS
CVE
CVE
added 2013/05/02 2:55 p.m.86 views

CVE-2009-5029

Integer overflow in the __tzfile_read function in glibc before 2.15 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted timezone (TZ) file, as demonstrated using vsftpd.

6.8CVSS8.6AI score0.02765EPSS
CVE
CVE
added 2013/10/09 10:55 p.m.86 views

CVE-2013-2207

pt_chown in GNU C Library (aka glibc or libc6) before 2.18 does not properly check permissions for tty files, which allows local users to change the permission on the files and obtain access to arbitrary pseudo-terminals by leveraging a FUSE file system.

2.6CVSS8AI score0.00071EPSS
CVE
CVE
added 2019/01/18 7:29 p.m.86 views

CVE-2019-6488

The string component in the GNU C Library (aka glibc or libc6) through 2.28, when running on the x32 architecture, incorrectly attempts to use a 64-bit register for size_t in assembly codes, which can lead to a segmentation fault or possibly unspecified other impact, as demonstrated by a crash in _...

7.8CVSS5.6AI score0.00099EPSS
CVE
CVE
added 2011/04/10 2:55 a.m.85 views

CVE-2011-1089

The addmntent function in the GNU C Library (aka glibc or libc6) 2.13 and earlier does not report an error status for failed attempts to write to the /etc/mtab file, which makes it easier for local users to trigger corruption of this file, as demonstrated by writes from a process with a small RLIMI...

3.3CVSS8.3AI score0.00107EPSS
CVE
CVE
added 2015/12/17 7:59 p.m.85 views

CVE-2015-5277

The get_contents function in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) before 2.20 might allow local users to cause a denial of service (heap corruption) or gain privileges via a long line in the NSS files database.

7.2CVSS7.9AI score0.00091EPSS
CVE
CVE
added 2010/06/01 8:30 p.m.84 views

CVE-2010-0296

The encode_name macro in misc/mntent_r.c in the GNU C Library (aka glibc or libc6) 2.11.1 and earlier, as used by ncpmount and mount.cifs, does not properly handle newline characters in mountpoint names, which allows local users to cause a denial of service (mtab corruption), or possibly modify mou...

7.2CVSS7.6AI score0.00107EPSS
CVE
CVE
added 2013/10/09 10:55 p.m.84 views

CVE-2012-4412

Integer overflow in string/strcoll_l.c in the GNU C Library (aka glibc or libc6) 2.17 and earlier allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string, which triggers a heap-based buffer overflow.

7.5CVSS8AI score0.20081EPSS
CVE
CVE
added 2013/10/04 5:55 p.m.81 views

CVE-2013-4788

The PTR_MANGLE implementation in the GNU C Library (aka glibc or libc6) 2.4, 2.17, and earlier, and Embedded GLIBC (EGLIBC) does not initialize the random value for the pointer guard, which makes it easier for context-dependent attackers to control execution flow by leveraging a buffer-overflow vul...

5.1CVSS7.2AI score0.0756EPSS
CVE
CVE
added 2017/10/20 5:29 p.m.81 views

CVE-2017-15671

The glob function in glob.c in the GNU C Library (aka glibc or libc6) before 2.27, when invoked with GLOB_TILDE, could skip freeing allocated memory when processing the ~ operator with a long user name, potentially leading to a denial of service (memory leak).

5.9CVSS6.9AI score0.00367EPSS
CVE
CVE
added 2012/08/25 10:29 a.m.80 views

CVE-2012-3480

Multiple integer overflows in the (1) strtod, (2) strtof, (3) strtold, (4) strtod_l, and other unspecified "related functions" in stdlib in GNU C Library (aka glibc or libc6) 2.16 allow local users to cause a denial of service (application crash) and possibly execute arbitrary code via a long strin...

4.6CVSS6.9AI score0.00203EPSS
CVE
CVE
added 2014/12/05 4:59 p.m.80 views

CVE-2012-6656

iconvdata/ibm930.c in GNU C Library (aka glibc) before 2.16 allows context-dependent attackers to cause a denial of service (out-of-bounds read) via a multibyte character value of "0xffff" to the iconv function when converting IBM930 encoded data to UTF-8.

5CVSS7AI score0.01382EPSS
CVE
CVE
added 2017/03/20 4:59 p.m.78 views

CVE-2015-8984

The fnmatch function in the GNU C Library (aka glibc or libc6) before 2.22 might allow context-dependent attackers to cause a denial of service (application crash) via a malformed pattern, which triggers an out-of-bounds read.

5.9CVSS5.9AI score0.00482EPSS
CVE
CVE
added 2013/10/09 10:55 p.m.77 views

CVE-2012-4424

Stack-based buffer overflow in string/strcoll_l.c in the GNU C Library (aka glibc or libc6) 2.17 and earlier allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string that triggers a malloc failure and use of the alloca function.

5.1CVSS7.9AI score0.00608EPSS
CVE
CVE
added 2017/12/05 5:29 p.m.77 views

CVE-2017-17426

The malloc function in the GNU C Library (aka glibc or libc6) 2.26 could return a memory block that is too small if an attempt is made to allocate an object whose size is close to SIZE_MAX, potentially leading to a subsequent heap overflow. This occurs because the per-thread cache (aka tcache) feat...

8.1CVSS8.5AI score0.00358EPSS
CVE
CVE
added 2011/01/13 7:0 p.m.75 views

CVE-2010-4051

The regcomp implementation in the GNU C Library (aka glibc or libc6) through 2.11.3, and 2.12.x through 2.12.2, allows context-dependent attackers to cause a denial of service (application crash) via a regular expression containing adjacent bounded repetitions that bypass the intended RE_DUP_MAX li...

5CVSS6.2AI score0.04846EPSS
CVE
CVE
added 2017/03/15 7:59 p.m.75 views

CVE-2015-8982

Integer overflow in the strxfrm function in the GNU C Library (aka glibc or libc6) before 2.21 allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string, which triggers a stack-based buffer overflow.

8.1CVSS7.2AI score0.0131EPSS
CVE
CVE
added 2005/02/13 5:0 a.m.74 views

CVE-2004-1453

GNU glibc 2.3.4 before 2.3.4.20040619, 2.3.3 before 2.3.3.20040420, and 2.3.2 before 2.3.2-r10 does not restrict the use of LD_DEBUG for a setuid program, which allows local users to gain sensitive information, such as the list of symbols used by the program.

2.1CVSS6AI score0.00078EPSS
CVE
CVE
added 2017/06/12 1:29 p.m.74 views

CVE-2014-9984

nscd in the GNU C Library (aka glibc or libc6) before version 2.20 does not correctly compute the size of an internal buffer when processing netgroup requests, possibly leading to an nscd daemon crash or code execution as the user running nscd.

9.8CVSS8.8AI score0.00482EPSS
CVE
CVE
added 2011/04/10 2:55 a.m.73 views

CVE-2011-1095

locale/programs/locale.c in locale in the GNU C Library (aka glibc or libc6) before 2.13 does not quote its output, which might allow local users to gain privileges via a crafted localization environment variable, in conjunction with a program that executes a script that uses the eval function.

6.2CVSS7.6AI score0.00087EPSS
CVE
CVE
added 2010/06/01 8:30 p.m.71 views

CVE-2010-0830

Integer signedness error in the elf_get_dynamic_info function in elf/dynamic-link.h in ld.so in the GNU C Library (aka glibc or libc6) 2.0.1 through 2.11.1, when the --verify option is used, allows user-assisted remote attackers to execute arbitrary code via a crafted ELF program with a negative va...

5.1CVSS8.4AI score0.06829EPSS
CVE
CVE
added 2011/04/08 3:17 p.m.71 views

CVE-2011-1658

ld.so in the GNU C Library (aka glibc or libc6) 2.13 and earlier expands the $ORIGIN dynamic string token when RPATH is composed entirely of this token, which might allow local users to gain privileges by creating a hard link in an arbitrary directory to a (1) setuid or (2) setgid program with this...

3.7CVSS8AI score0.05524EPSS
CVE
CVE
added 2023/06/25 5:15 p.m.71 views

CVE-2015-20109

end_pattern (called from internal_fnmatch) in the GNU C Library (aka glibc or libc6) before 2.22 might allow context-dependent attackers to cause a denial of service (application crash), as demonstrated by use of the fnmatch library function with the **(!() pattern. NOTE: this is not the same as CV...

5.5CVSS6AI score0.00482EPSS
CVE
CVE
added 2004/09/01 4:0 a.m.70 views

CVE-2002-1146

The BIND 4 and BIND 8.2.x stub resolver libraries, and other libraries such as glibc 2.2.5 and earlier, libc, and libresolv, use the maximum buffer size instead of the actual size when processing a DNS response, which causes the stub resolvers to read past the actual boundary ("read buffer overflow...

5CVSS6.5AI score0.08324EPSS
CVE
CVE
added 2017/05/07 6:29 p.m.69 views

CVE-2017-8804

The xdr_bytes and xdr_string functions in the GNU C Library (aka glibc or libc6) 2.25 mishandle failures of buffer deserialization, which allows remote attackers to cause a denial of service (virtual memory allocation, or memory consumption if an overcommit setting is not used) via a crafted UDP pa...

7.8CVSS7.4AI score0.84199EPSS
CVE
CVE
added 2020/10/06 1:15 p.m.68 views

CVE-1999-0199

manual/search.texi in the GNU C Library (aka glibc) before 2.2 lacks a statement about the unspecified tdelete return value upon deletion of a tree's root, which might allow attackers to access a dangling pointer in an application whose developer was unaware of a documentation update from 1999.

9.8CVSS9.3AI score0.00677EPSS
CVE
CVE
added 2010/06/01 8:30 p.m.67 views

CVE-2009-4881

Integer overflow in the __vstrfmon_l function in stdlib/strfmon_l.c in the strfmon implementation in the GNU C Library (aka glibc or libc6) before 2.10.1 allows context-dependent attackers to cause a denial of service (application crash) via a crafted format string, as demonstrated by the %99999999...

5CVSS6.4AI score0.20122EPSS
CVE
CVE
added 2019/04/10 8:29 p.m.65 views

CVE-2005-3590

The getgrouplist function in the GNU C library (glibc) before version 2.3.5, when invoked with a zero argument, writes to the passed pointer even if the specified array size is zero, leading to a buffer overflow and potentially allowing attackers to corrupt memory.

9.8CVSS9.6AI score0.00492EPSS
CVE
CVE
added 2004/09/01 4:0 a.m.64 views

CVE-2002-1265

The Sun RPC functionality in multiple libc implementations does not provide a time-out mechanism when reading data from TCP connections, which allows remote attackers to cause a denial of service (hang).

5CVSS6.2AI score0.02369EPSS
CVE
CVE
added 2014/10/27 8:55 p.m.64 views

CVE-2011-2702

Integer signedness error in Glibc before 2.13 and eglibc before 2.13, when using Supplemental Streaming SIMD Extensions 3 (SSSE3) optimization, allows context-dependent attackers to execute arbitrary code via a negative length parameter to (1) memcpy-ssse3-rep.S, (2) memcpy-ssse3.S, or (3) memset-s...

6.8CVSS7.3AI score0.04486EPSS
CVE
CVE
added 2010/01/14 6:30 p.m.63 views

CVE-2010-0015

nis/nss_nis/nis-pwd.c in the GNU C Library (aka glibc or libc6) 2.7 and Embedded GLIBC (EGLIBC) 2.10.2 adds information from the passwd.adjunct.byname map to entries in the passwd map, which allows remote attackers to obtain the encrypted passwords of NIS accounts by calling the getpwnam function.

7.5CVSS6AI score0.01817EPSS
CVE
CVE
added 2016/10/07 2:59 p.m.62 views

CVE-2016-6323

The makecontext function in the GNU C Library (aka glibc or libc6) before 2.25 creates execution contexts incompatible with the unwinder on ARM EABI (32-bit) platforms, which might allow context-dependent attackers to cause a denial of service (hang), as demonstrated by applications compiled using ...

7.5CVSS7.1AI score0.01133EPSS
CVE
CVE
added 2002/08/12 4:0 a.m.61 views

CVE-2002-0684

Buffer overflow in DNS resolver functions that perform lookup of network names and addresses, as used in BIND 4.9.8 and ported to glibc 2.2.5 and earlier, allows remote malicious DNS servers to execute arbitrary code through a subroutine used by functions such as getnetbyname and getnetbyaddr.

7.5CVSS9.7AI score0.03535EPSS
CVE
CVE
added 2011/03/30 10:55 p.m.61 views

CVE-2009-5064

ldd in the GNU C Library (aka glibc or libc6) 2.13 and earlier allows local users to gain privileges via a Trojan horse executable file linked with a modified loader that omits certain LD_TRACE_LOADED_OBJECTS checks. NOTE: the GNU C Library vendor states "This is just nonsense. There are a gazillio...

6.9CVSS8.1AI score0.00073EPSS
CVE
CVE
added 2017/02/17 2:59 a.m.60 views

CVE-2016-5417

Memory leak in the __res_vinit function in the IPv6 name server management code in libresolv in GNU C Library (aka glibc or libc6) before 2.24 allows remote attackers to cause a denial of service (memory consumption) by leveraging partial initialization of internal resolver data structures.

7.5CVSS7AI score0.01192EPSS
CVE
CVE
added 2013/05/02 2:55 p.m.59 views

CVE-2011-4609

The svc_run function in the RPC implementation in glibc before 2.15 allows remote attackers to cause a denial of service (CPU consumption) via a large number of RPC connections.

5CVSS8.5AI score0.00727EPSS
CVE
CVE
added 2005/02/06 5:0 a.m.57 views

CVE-2004-1382

The glibcbug script in glibc 2.3.4 and earlier allows local users to overwrite arbitrary files via a symlink attack on temporary files, a different vulnerability than CVE-2004-0968.

2.1CVSS6.1AI score0.00087EPSS
CVE
CVE
added 2011/04/08 3:17 p.m.55 views

CVE-2011-1659

Integer overflow in posix/fnmatch.c in the GNU C Library (aka glibc or libc6) 2.13 and earlier allows context-dependent attackers to cause a denial of service (application crash) via a long UTF8 string that is used in an fnmatch call with a crafted pattern argument, a different vulnerability than C...

5CVSS7.5AI score0.05656EPSS
CVE
CVE
added 2017/10/18 2:29 p.m.54 views

CVE-2011-5320

scanf and related functions in glibc before 2.15 allow local users to cause a denial of service (segmentation fault) via a large string of 0s.

6.2CVSS6.5AI score0.0006EPSS
CVE
CVE
added 2003/12/15 5:0 a.m.53 views

CVE-2003-0859

The getifaddrs function in GNU libc (glibc) 2.2.4 and earlier allows local users to cause a denial of service by sending spoofed messages as other users to the kernel netlink interface.

4.9CVSS6AI score0.00054EPSS
CVE
CVE
added 2001/01/22 5:0 a.m.52 views

CVE-2000-0824

The unsetenv function in glibc 2.1.1 does not properly unset an environmental variable if the variable is provided twice to a program, which could allow local users to execute arbitrary commands in setuid programs by specifying their own duplicate environmental variables such as LD_PRELOAD or LD_LI...

7.2CVSS7.1AI score0.00306EPSS
CVE
CVE
added 2010/10/14 5:58 a.m.49 views

CVE-2010-3192

Certain run-time memory protection mechanisms in the GNU C Library (aka glibc or libc6) print argv[0] and backtrace information, which might allow context-dependent attackers to obtain sensitive information from process memory by executing an incorrect program, as demonstrated by a setuid program t...

5CVSS6.8AI score0.00786EPSS
CVE
CVE
added 2019/04/10 8:29 p.m.48 views

CVE-2006-7254

The nscd daemon in the GNU C Library (glibc) before version 2.5 does not close incoming client sockets if they cannot be handled by the daemon, allowing local users to carry out a denial of service attack on the daemon.

5.5CVSS5.3AI score0.00042EPSS
CVE
CVE
added 2000/10/13 4:0 a.m.43 views

CVE-2000-0335

The resolver in glibc 2.1.3 uses predictable IDs, which allows a local attacker to spoof DNS query results.

7.5CVSS6.6AI score0.01131EPSS
CVE
CVE
added 2001/01/22 5:0 a.m.37 views

CVE-2000-0959

glibc2 does not properly clear the LD_DEBUG_OUTPUT and LD_DEBUG environmental variables when a program is spawned from a setuid program, which could allow local users to overwrite files via a symlink attack.

1.2CVSS6.3AI score0.00089EPSS
Total number of security vulnerabilities149