Show filters
47 Total Results
Displaying 11-20 of 47
Sort by:
Attacker Value
Unknown
CVE-2012-4412
Disclosure Date: October 09, 2013 (last updated October 05, 2023)
Integer overflow in string/strcoll_l.c in the GNU C Library (aka glibc or libc6) 2.17 and earlier allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string, which triggers a heap-based buffer overflow.
0
Attacker Value
Unknown
CVE-2013-4332
Disclosure Date: October 09, 2013 (last updated October 05, 2023)
Multiple integer overflows in malloc/malloc.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allow context-dependent attackers to cause a denial of service (heap corruption) via a large value to the (1) pvalloc, (2) valloc, (3) posix_memalign, (4) memalign, or (5) aligned_alloc functions.
0
Attacker Value
Unknown
CVE-2013-4237
Disclosure Date: October 09, 2013 (last updated October 05, 2023)
sysdeps/posix/readdir_r.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted (1) NTFS or (2) CIFS image.
0
Attacker Value
Unknown
CVE-2012-4424
Disclosure Date: October 09, 2013 (last updated October 05, 2023)
Stack-based buffer overflow in string/strcoll_l.c in the GNU C Library (aka glibc or libc6) 2.17 and earlier allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string that triggers a malloc failure and use of the alloca function.
0
Attacker Value
Unknown
CVE-2013-2207
Disclosure Date: October 09, 2013 (last updated October 05, 2023)
pt_chown in GNU C Library (aka glibc or libc6) before 2.18 does not properly check permissions for tty files, which allows local users to change the permission on the files and obtain access to arbitrary pseudo-terminals by leveraging a FUSE file system.
0
Attacker Value
Unknown
CVE-2013-4788
Disclosure Date: October 04, 2013 (last updated October 05, 2023)
The PTR_MANGLE implementation in the GNU C Library (aka glibc or libc6) 2.4, 2.17, and earlier, and Embedded GLIBC (EGLIBC) does not initialize the random value for the pointer guard, which makes it easier for context-dependent attackers to control execution flow by leveraging a buffer-overflow vulnerability in an application and using the known zero value pointer guard to calculate a pointer address.
0
Attacker Value
Unknown
CVE-2009-5029
Disclosure Date: May 02, 2013 (last updated October 05, 2023)
Integer overflow in the __tzfile_read function in glibc before 2.15 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted timezone (TZ) file, as demonstrated using vsftpd.
0
Attacker Value
Unknown
CVE-2011-4609
Disclosure Date: May 02, 2013 (last updated October 05, 2023)
The svc_run function in the RPC implementation in glibc before 2.15 allows remote attackers to cause a denial of service (CPU consumption) via a large number of RPC connections.
0
Attacker Value
Unknown
CVE-2012-0864
Disclosure Date: May 02, 2013 (last updated October 05, 2023)
Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arguments.
0
Attacker Value
Unknown
CVE-2013-1914
Disclosure Date: April 29, 2013 (last updated October 05, 2023)
Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.17 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of domain conversion results.
0