ID |
CVE-2012-0864
|
Summary |
Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arguments. |
References |
|
Vulnerable Configurations |
|
CVSS |
Base: | 6.8 (as of 13-02-2023 - 03:28) |
Impact: | |
Exploitability: | |
|
CWE |
CWE-189 |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
MEDIUM |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
PARTIAL |
PARTIAL |
PARTIAL |
|
cvss-vector
via4
|
AV:N/AC:M/Au:N/C:P/I:P/A:P
|
redhat
via4
|
advisories | bugzilla | id | 799259 | title | Change in memcpy behavior for overlapping arguments breaks existing applications |
| oval | OR | comment | Red Hat Enterprise Linux must be installed | oval | oval:com.redhat.rhba:tst:20070304026 |
AND | comment | Red Hat Enterprise Linux 6 is installed | oval | oval:com.redhat.rhba:tst:20111656003 |
OR | AND | comment | glibc is earlier than 0:2.12-1.47.el6_2.9 | oval | oval:com.redhat.rhsa:tst:20120393001 |
comment | glibc is signed with Red Hat redhatrelease2 key | oval | oval:com.redhat.rhba:tst:20120763002 |
|
AND | comment | glibc-common is earlier than 0:2.12-1.47.el6_2.9 | oval | oval:com.redhat.rhsa:tst:20120393003 |
comment | glibc-common is signed with Red Hat redhatrelease2 key | oval | oval:com.redhat.rhba:tst:20120763004 |
|
AND | comment | glibc-devel is earlier than 0:2.12-1.47.el6_2.9 | oval | oval:com.redhat.rhsa:tst:20120393005 |
comment | glibc-devel is signed with Red Hat redhatrelease2 key | oval | oval:com.redhat.rhba:tst:20120763006 |
|
AND | comment | glibc-headers is earlier than 0:2.12-1.47.el6_2.9 | oval | oval:com.redhat.rhsa:tst:20120393007 |
comment | glibc-headers is signed with Red Hat redhatrelease2 key | oval | oval:com.redhat.rhba:tst:20120763008 |
|
AND | comment | glibc-static is earlier than 0:2.12-1.47.el6_2.9 | oval | oval:com.redhat.rhsa:tst:20120393009 |
comment | glibc-static is signed with Red Hat redhatrelease2 key | oval | oval:com.redhat.rhba:tst:20120763010 |
|
AND | comment | glibc-utils is earlier than 0:2.12-1.47.el6_2.9 | oval | oval:com.redhat.rhsa:tst:20120393011 |
comment | glibc-utils is signed with Red Hat redhatrelease2 key | oval | oval:com.redhat.rhba:tst:20120763012 |
|
AND | comment | nscd is earlier than 0:2.12-1.47.el6_2.9 | oval | oval:com.redhat.rhsa:tst:20120393013 |
comment | nscd is signed with Red Hat redhatrelease2 key | oval | oval:com.redhat.rhba:tst:20120763014 |
|
|
|
|
| rhsa | id | RHSA-2012:0393 | released | 2012-03-15 | severity | Moderate | title | RHSA-2012:0393: glibc security and bug fix update (Moderate) |
|
bugzilla | id | 794766 | title | integer overflow |
| oval | OR | comment | Red Hat Enterprise Linux must be installed | oval | oval:com.redhat.rhba:tst:20070304026 |
AND | comment | Red Hat Enterprise Linux 5 is installed | oval | oval:com.redhat.rhba:tst:20070331005 |
OR | AND | comment | glibc is earlier than 0:2.5-81.el5_8.1 | oval | oval:com.redhat.rhsa:tst:20120397001 |
comment | glibc is signed with Red Hat redhatrelease key | oval | oval:com.redhat.rhba:tst:20130022002 |
|
AND | comment | glibc-common is earlier than 0:2.5-81.el5_8.1 | oval | oval:com.redhat.rhsa:tst:20120397003 |
comment | glibc-common is signed with Red Hat redhatrelease key | oval | oval:com.redhat.rhba:tst:20130022004 |
|
AND | comment | glibc-devel is earlier than 0:2.5-81.el5_8.1 | oval | oval:com.redhat.rhsa:tst:20120397005 |
comment | glibc-devel is signed with Red Hat redhatrelease key | oval | oval:com.redhat.rhba:tst:20130022006 |
|
AND | comment | glibc-headers is earlier than 0:2.5-81.el5_8.1 | oval | oval:com.redhat.rhsa:tst:20120397007 |
comment | glibc-headers is signed with Red Hat redhatrelease key | oval | oval:com.redhat.rhba:tst:20130022008 |
|
AND | comment | glibc-utils is earlier than 0:2.5-81.el5_8.1 | oval | oval:com.redhat.rhsa:tst:20120397009 |
comment | glibc-utils is signed with Red Hat redhatrelease key | oval | oval:com.redhat.rhba:tst:20130022010 |
|
AND | comment | nscd is earlier than 0:2.5-81.el5_8.1 | oval | oval:com.redhat.rhsa:tst:20120397011 |
comment | nscd is signed with Red Hat redhatrelease key | oval | oval:com.redhat.rhba:tst:20130022012 |
|
|
|
|
| rhsa | id | RHSA-2012:0397 | released | 2012-03-19 | severity | Moderate | title | RHSA-2012:0397: glibc security update (Moderate) |
|
| rpms | - glibc-0:2.12-1.47.el6_2.9
- glibc-common-0:2.12-1.47.el6_2.9
- glibc-debuginfo-0:2.12-1.47.el6_2.9
- glibc-debuginfo-common-0:2.12-1.47.el6_2.9
- glibc-devel-0:2.12-1.47.el6_2.9
- glibc-headers-0:2.12-1.47.el6_2.9
- glibc-static-0:2.12-1.47.el6_2.9
- glibc-utils-0:2.12-1.47.el6_2.9
- nscd-0:2.12-1.47.el6_2.9
- glibc-0:2.5-81.el5_8.1
- glibc-common-0:2.5-81.el5_8.1
- glibc-debuginfo-0:2.5-81.el5_8.1
- glibc-debuginfo-common-0:2.5-81.el5_8.1
- glibc-devel-0:2.5-81.el5_8.1
- glibc-headers-0:2.5-81.el5_8.1
- glibc-utils-0:2.5-81.el5_8.1
- nscd-0:2.5-81.el5_8.1
- rhev-hypervisor6-0:6.2-20120423.1.el6_2
- rhev-hypervisor6-tools-0:6.2-20120423.1.el6_2
|
|
refmap
via4
|
|
Last major update |
13-02-2023 - 03:28 |
Published |
02-05-2013 - 14:55 |
Last modified |
13-02-2023 - 03:28 |