ALT-PU-2016-1968-1
Closed vulnerabilities
Published: 2012-08-25
BDU:2016-01582
Уязвимости библиотеки, обеспечивающей системные вызовы и основные функции glibc, позволяющие нарушителю вызвать отказ в обслуживании или выполнить произвольный код
Severity: MEDIUM (4.6)
References:
Published: 2012-08-25
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2012-3480
Multiple integer overflows in the (1) strtod, (2) strtof, (3) strtold, (4) strtod_l, and other unspecified "related functions" in stdlib in GNU C Library (aka glibc or libc6) 2.16 allow local users to cause a denial of service (application crash) and possibly execute arbitrary code via a long string, which triggers a stack-based buffer overflow.
Severity: MEDIUM (4.6)
References:
- FEDORA-2012-11927
- FEDORA-2012-11927
- 84710
- 84710
- RHSA-2012:1207
- RHSA-2012:1207
- RHSA-2012:1208
- RHSA-2012:1208
- RHSA-2012:1262
- RHSA-2012:1262
- RHSA-2012:1325
- RHSA-2012:1325
- 50201
- 50201
- 50422
- 50422
- http://sourceware.org/bugzilla/show_bug.cgi?id=14459
- http://sourceware.org/bugzilla/show_bug.cgi?id=14459
- [libc-alpha] 20120812 Fix strtod integer/buffer overflow (bug 14459)
- [libc-alpha] 20120812 Fix strtod integer/buffer overflow (bug 14459)
- [oss-security] 20120813 CVE Request -- glibc: Integer overflows, leading to stack-based buffer overflows in strto* related routines
- [oss-security] 20120813 CVE Request -- glibc: Integer overflows, leading to stack-based buffer overflows in strto* related routines
- [oss-security] 20120813 Re: CVE Request -- glibc: Integer overflows, leading to stack-based buffer overflows in strto* related routines
- [oss-security] 20120813 Re: CVE Request -- glibc: Integer overflows, leading to stack-based buffer overflows in strto* related routines
- 54982
- 54982
- 1027374
- 1027374
- USN-1589-1
- USN-1589-1
- GLSA-201503-04
- GLSA-201503-04