ID CVE-2012-0864
Summary Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arguments.
References
Vulnerable Configurations
  • cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*
CVSS
Base: 6.8 (as of 13-02-2023 - 03:28)
Impact:
Exploitability:
CWE CWE-189
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:M/Au:N/C:P/I:P/A:P
redhat via4
advisories
  • bugzilla
    id 799259
    title Change in memcpy behavior for overlapping arguments breaks existing applications
    oval
    OR
    • comment Red Hat Enterprise Linux must be installed
      oval oval:com.redhat.rhba:tst:20070304026
    • AND
      • comment Red Hat Enterprise Linux 6 is installed
        oval oval:com.redhat.rhba:tst:20111656003
      • OR
        • AND
          • comment glibc is earlier than 0:2.12-1.47.el6_2.9
            oval oval:com.redhat.rhsa:tst:20120393001
          • comment glibc is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhba:tst:20120763002
        • AND
          • comment glibc-common is earlier than 0:2.12-1.47.el6_2.9
            oval oval:com.redhat.rhsa:tst:20120393003
          • comment glibc-common is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhba:tst:20120763004
        • AND
          • comment glibc-devel is earlier than 0:2.12-1.47.el6_2.9
            oval oval:com.redhat.rhsa:tst:20120393005
          • comment glibc-devel is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhba:tst:20120763006
        • AND
          • comment glibc-headers is earlier than 0:2.12-1.47.el6_2.9
            oval oval:com.redhat.rhsa:tst:20120393007
          • comment glibc-headers is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhba:tst:20120763008
        • AND
          • comment glibc-static is earlier than 0:2.12-1.47.el6_2.9
            oval oval:com.redhat.rhsa:tst:20120393009
          • comment glibc-static is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhba:tst:20120763010
        • AND
          • comment glibc-utils is earlier than 0:2.12-1.47.el6_2.9
            oval oval:com.redhat.rhsa:tst:20120393011
          • comment glibc-utils is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhba:tst:20120763012
        • AND
          • comment nscd is earlier than 0:2.12-1.47.el6_2.9
            oval oval:com.redhat.rhsa:tst:20120393013
          • comment nscd is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhba:tst:20120763014
    rhsa
    id RHSA-2012:0393
    released 2012-03-15
    severity Moderate
    title RHSA-2012:0393: glibc security and bug fix update (Moderate)
  • bugzilla
    id 794766
    title integer overflow
    oval
    OR
    • comment Red Hat Enterprise Linux must be installed
      oval oval:com.redhat.rhba:tst:20070304026
    • AND
      • comment Red Hat Enterprise Linux 5 is installed
        oval oval:com.redhat.rhba:tst:20070331005
      • OR
        • AND
          • comment glibc is earlier than 0:2.5-81.el5_8.1
            oval oval:com.redhat.rhsa:tst:20120397001
          • comment glibc is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhba:tst:20130022002
        • AND
          • comment glibc-common is earlier than 0:2.5-81.el5_8.1
            oval oval:com.redhat.rhsa:tst:20120397003
          • comment glibc-common is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhba:tst:20130022004
        • AND
          • comment glibc-devel is earlier than 0:2.5-81.el5_8.1
            oval oval:com.redhat.rhsa:tst:20120397005
          • comment glibc-devel is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhba:tst:20130022006
        • AND
          • comment glibc-headers is earlier than 0:2.5-81.el5_8.1
            oval oval:com.redhat.rhsa:tst:20120397007
          • comment glibc-headers is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhba:tst:20130022008
        • AND
          • comment glibc-utils is earlier than 0:2.5-81.el5_8.1
            oval oval:com.redhat.rhsa:tst:20120397009
          • comment glibc-utils is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhba:tst:20130022010
        • AND
          • comment nscd is earlier than 0:2.5-81.el5_8.1
            oval oval:com.redhat.rhsa:tst:20120397011
          • comment nscd is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhba:tst:20130022012
    rhsa
    id RHSA-2012:0397
    released 2012-03-19
    severity Moderate
    title RHSA-2012:0397: glibc security update (Moderate)
  • rhsa
    id RHSA-2012:0488
  • rhsa
    id RHSA-2012:0531
rpms
  • glibc-0:2.12-1.47.el6_2.9
  • glibc-common-0:2.12-1.47.el6_2.9
  • glibc-debuginfo-0:2.12-1.47.el6_2.9
  • glibc-debuginfo-common-0:2.12-1.47.el6_2.9
  • glibc-devel-0:2.12-1.47.el6_2.9
  • glibc-headers-0:2.12-1.47.el6_2.9
  • glibc-static-0:2.12-1.47.el6_2.9
  • glibc-utils-0:2.12-1.47.el6_2.9
  • nscd-0:2.12-1.47.el6_2.9
  • glibc-0:2.5-81.el5_8.1
  • glibc-common-0:2.5-81.el5_8.1
  • glibc-debuginfo-0:2.5-81.el5_8.1
  • glibc-debuginfo-common-0:2.5-81.el5_8.1
  • glibc-devel-0:2.5-81.el5_8.1
  • glibc-headers-0:2.5-81.el5_8.1
  • glibc-utils-0:2.5-81.el5_8.1
  • nscd-0:2.5-81.el5_8.1
  • rhev-hypervisor6-0:6.2-20120423.1.el6_2
  • rhev-hypervisor6-tools-0:6.2-20120423.1.el6_2
refmap via4
bid 52201
confirm https://bugzilla.redhat.com/show_bug.cgi?id=794766
misc
mlist [libc-alpha] 20120202 [PATCH] vfprintf: validate nargs and positional offsets
Last major update 13-02-2023 - 03:28
Published 02-05-2013 - 14:55
Last modified 13-02-2023 - 03:28
Back to Top