Show filters
183 Total Results
Displaying 131-140 of 183
Sort by:
Attacker Value
Unknown

CVE-2012-3404

Disclosure Date: February 10, 2014 (last updated October 05, 2023)
The vfprintf function in stdio-common/vfprintf.c in libc in GNU C Library (aka glibc) 2.12 and other versions does not properly calculate a buffer length, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a denial of service (stack corruption and crash) via a format string that uses positional parameters and many format specifiers.
0
Attacker Value
Unknown

CVE-2012-3406

Disclosure Date: February 10, 2014 (last updated October 05, 2023)
The vfprintf function in stdio-common/vfprintf.c in GNU C Library (aka glibc) 2.5, 2.12, and probably other versions does not "properly restrict the use of" the alloca function when allocating the SPECS array, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a denial of service (crash) or possibly execute arbitrary code via a crafted format string using positional parameters and a large number of format specifiers, a different vulnerability than CVE-2012-3404 and CVE-2012-3405.
0
Attacker Value
Unknown

CVE-2013-4458

Disclosure Date: December 12, 2013 (last updated November 08, 2023)
Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.18 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of AF_INET6 address results. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1914.
0
Attacker Value
Unknown

CVE-2012-4412

Disclosure Date: October 09, 2013 (last updated October 05, 2023)
Integer overflow in string/strcoll_l.c in the GNU C Library (aka glibc or libc6) 2.17 and earlier allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string, which triggers a heap-based buffer overflow.
0
Attacker Value
Unknown

CVE-2013-4332

Disclosure Date: October 09, 2013 (last updated October 05, 2023)
Multiple integer overflows in malloc/malloc.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allow context-dependent attackers to cause a denial of service (heap corruption) via a large value to the (1) pvalloc, (2) valloc, (3) posix_memalign, (4) memalign, or (5) aligned_alloc functions.
0
Attacker Value
Unknown

CVE-2013-4237

Disclosure Date: October 09, 2013 (last updated October 05, 2023)
sysdeps/posix/readdir_r.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted (1) NTFS or (2) CIFS image.
0
Attacker Value
Unknown

CVE-2012-4424

Disclosure Date: October 09, 2013 (last updated October 05, 2023)
Stack-based buffer overflow in string/strcoll_l.c in the GNU C Library (aka glibc or libc6) 2.17 and earlier allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string that triggers a malloc failure and use of the alloca function.
0
Attacker Value
Unknown

CVE-2013-2207

Disclosure Date: October 09, 2013 (last updated October 05, 2023)
pt_chown in GNU C Library (aka glibc or libc6) before 2.18 does not properly check permissions for tty files, which allows local users to change the permission on the files and obtain access to arbitrary pseudo-terminals by leveraging a FUSE file system.
0
Attacker Value
Unknown

CVE-2013-4788

Disclosure Date: October 04, 2013 (last updated October 05, 2023)
The PTR_MANGLE implementation in the GNU C Library (aka glibc or libc6) 2.4, 2.17, and earlier, and Embedded GLIBC (EGLIBC) does not initialize the random value for the pointer guard, which makes it easier for context-dependent attackers to control execution flow by leveraging a buffer-overflow vulnerability in an application and using the known zero value pointer guard to calculate a pointer address.
0
Attacker Value
Unknown

CVE-2009-5029

Disclosure Date: May 02, 2013 (last updated October 05, 2023)
Integer overflow in the __tzfile_read function in glibc before 2.15 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted timezone (TZ) file, as demonstrated using vsftpd.
0