The GNU C Library (aka glibc or libc6) before 2.12.2 and Embedded GLIBC (EGLIBC) allow context-dependent attackers to execute arbitrary code or cause a denial of service (memory consumption) via a long UTF8 string that is used in an fnmatch call, aka a "stack extension attack," a related issue to CVE-2010-2898, CVE-2010-1917, and CVE-2007-4782, as originally reported for use of this library by Google Chrome.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:25
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugs.debian.org/615120 - Exploit | |
References | () http://code.google.com/p/chromium/issues/detail?id=48733 - Exploit | |
References | () http://openwall.com/lists/oss-security/2011/02/26/3 - | |
References | () http://openwall.com/lists/oss-security/2011/02/28/11 - Exploit | |
References | () http://openwall.com/lists/oss-security/2011/02/28/15 - | |
References | () http://scarybeastsecurity.blogspot.com/2011/02/i-got-accidental-code-execution-via.html - Exploit | |
References | () http://seclists.org/fulldisclosure/2011/Feb/635 - Exploit | |
References | () http://seclists.org/fulldisclosure/2011/Feb/644 - Patch | |
References | () http://secunia.com/advisories/43492 - Vendor Advisory | |
References | () http://secunia.com/advisories/43830 - Vendor Advisory | |
References | () http://secunia.com/advisories/43989 - Vendor Advisory | |
References | () http://secunia.com/advisories/46397 - Vendor Advisory | |
References | () http://securityreason.com/securityalert/8175 - | |
References | () http://securitytracker.com/id?1025290 - | |
References | () http://sourceware.org/bugzilla/show_bug.cgi?id=11883 - Exploit | |
References | () http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=f15ce4d8dc139523fe0c273580b604b2453acba6 - | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2011:178 - | |
References | () http://www.redhat.com/support/errata/RHSA-2011-0412.html - Vendor Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2011-0413.html - Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/520102/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/46563 - Exploit | |
References | () http://www.vmware.com/security/advisories/VMSA-2011-0012.html - | |
References | () http://www.vupen.com/english/advisories/2011/0863 - Vendor Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=681054 - Exploit, Patch | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12853 - |
Information
Published : 2011-04-08 15:17
Updated : 2024-11-21 01:25
NVD link : CVE-2011-1071
Mitre link : CVE-2011-1071
CVE.ORG link : CVE-2011-1071
JSON object : View
Products Affected
gnu
- glibc
- eglibc
CWE
CWE-399
Resource Management Errors