Integer signedness error in Glibc before 2.13 and eglibc before 2.13, when using Supplemental Streaming SIMD Extensions 3 (SSSE3) optimization, allows context-dependent attackers to execute arbitrary code via a negative length parameter to (1) memcpy-ssse3-rep.S, (2) memcpy-ssse3.S, or (3) memset-sse2.S in sysdeps/i386/i686/multiarch/, which triggers an out-of-bounds read, as demonstrated using the memcpy function.
References
Configurations
History
21 Nov 2024, 01:28
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/oss-sec/2011/q3/123 - | |
References | () http://seclists.org/oss-sec/2011/q3/153 - | |
References | () http://www.eglibc.org/cgi-bin/viewvc.cgi/trunk/libc/ChangeLog?view=markup&pathrev=10032 - | |
References | () http://www.nodefense.org/eglibc.txt - | |
References | () http://www.osvdb.org/80718 - | |
References | () http://xorl.wordpress.com/2011/08/06/cve-2011-2702-eglibc-and-glibc-signedness-issue/ - Exploit | |
References | () https://bugzilla.novell.com/show_bug.cgi?id=706915 - | |
References | () https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=a0ac24d98ace90d1ccba6a2f3e7d55600f2fdb6e - |
Information
Published : 2014-10-27 20:55
Updated : 2024-11-21 01:28
NVD link : CVE-2011-2702
Mitre link : CVE-2011-2702
CVE.ORG link : CVE-2011-2702
JSON object : View
Products Affected
gnu
- glibc
- eglibc
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')