CVE-2011-4599

Stack-based buffer overflow in the _canonicalize function in common/uloc.c in International Components for Unicode (ICU) before 49.1 allows remote attackers to execute arbitrary code via a crafted locale ID that is not properly handled during variant canonicalization.
References
Link Resource
http://bugs.icu-project.org/trac/ticket/8984 Issue Tracking Vendor Advisory
http://code.google.com/p/chromium/issues/detail?id=106441 Third Party Advisory
http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html Mailing List Third Party Advisory
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2012-01/msg00035.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2011-1815.html Third Party Advisory
http://secunia.com/advisories/47146 Permissions Required
http://secunia.com/advisories/47227 Permissions Required
http://secunia.com/advisories/47674 Permissions Required
http://secunia.com/advisories/47714 Permissions Required
http://secunia.com/advisories/47775 Permissions Required
http://support.apple.com/kb/HT5501 Third Party Advisory
http://support.apple.com/kb/HT5503 Third Party Advisory
http://ubuntu.com/usn/usn-1348-1 Third Party Advisory
http://www.debian.org/security/2012/dsa-2397 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2011:194 Third Party Advisory
http://www.openwall.com/lists/oss-security/2011/12/09/2 Mailing List
http://www.openwall.com/lists/oss-security/2011/12/09/5 Mailing List
http://www.osvdb.org/77698 Broken Link
http://www.securityfocus.com/bid/51006 Patch Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/71726 VDB Entry
http://bugs.icu-project.org/trac/ticket/8984 Issue Tracking Vendor Advisory
http://code.google.com/p/chromium/issues/detail?id=106441 Third Party Advisory
http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html Mailing List Third Party Advisory
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2012-01/msg00035.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2011-1815.html Third Party Advisory
http://secunia.com/advisories/47146 Permissions Required
http://secunia.com/advisories/47227 Permissions Required
http://secunia.com/advisories/47674 Permissions Required
http://secunia.com/advisories/47714 Permissions Required
http://secunia.com/advisories/47775 Permissions Required
http://support.apple.com/kb/HT5501 Third Party Advisory
http://support.apple.com/kb/HT5503 Third Party Advisory
http://ubuntu.com/usn/usn-1348-1 Third Party Advisory
http://www.debian.org/security/2012/dsa-2397 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2011:194 Third Party Advisory
http://www.openwall.com/lists/oss-security/2011/12/09/2 Mailing List
http://www.openwall.com/lists/oss-security/2011/12/09/5 Mailing List
http://www.osvdb.org/77698 Broken Link
http://www.securityfocus.com/bid/51006 Patch Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/71726 VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:icu-project:international_components_for_unicode:*:*:*:*:*:c\/c\+\+:*:*

History

21 Nov 2024, 01:32

Type Values Removed Values Added
References () http://bugs.icu-project.org/trac/ticket/8984 - Issue Tracking, Vendor Advisory () http://bugs.icu-project.org/trac/ticket/8984 - Issue Tracking, Vendor Advisory
References () http://code.google.com/p/chromium/issues/detail?id=106441 - Third Party Advisory () http://code.google.com/p/chromium/issues/detail?id=106441 - Third Party Advisory
References () http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html - Mailing List, Third Party Advisory () http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html - Mailing List, Third Party Advisory
References () http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html - Mailing List, Third Party Advisory () http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-updates/2012-01/msg00035.html - Third Party Advisory () http://lists.opensuse.org/opensuse-updates/2012-01/msg00035.html - Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2011-1815.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2011-1815.html - Third Party Advisory
References () http://secunia.com/advisories/47146 - Permissions Required () http://secunia.com/advisories/47146 - Permissions Required
References () http://secunia.com/advisories/47227 - Permissions Required () http://secunia.com/advisories/47227 - Permissions Required
References () http://secunia.com/advisories/47674 - Permissions Required () http://secunia.com/advisories/47674 - Permissions Required
References () http://secunia.com/advisories/47714 - Permissions Required () http://secunia.com/advisories/47714 - Permissions Required
References () http://secunia.com/advisories/47775 - Permissions Required () http://secunia.com/advisories/47775 - Permissions Required
References () http://support.apple.com/kb/HT5501 - Third Party Advisory () http://support.apple.com/kb/HT5501 - Third Party Advisory
References () http://support.apple.com/kb/HT5503 - Third Party Advisory () http://support.apple.com/kb/HT5503 - Third Party Advisory
References () http://ubuntu.com/usn/usn-1348-1 - Third Party Advisory () http://ubuntu.com/usn/usn-1348-1 - Third Party Advisory
References () http://www.debian.org/security/2012/dsa-2397 - Third Party Advisory () http://www.debian.org/security/2012/dsa-2397 - Third Party Advisory
References () http://www.mandriva.com/security/advisories?name=MDVSA-2011:194 - Third Party Advisory () http://www.mandriva.com/security/advisories?name=MDVSA-2011:194 - Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2011/12/09/2 - Mailing List () http://www.openwall.com/lists/oss-security/2011/12/09/2 - Mailing List
References () http://www.openwall.com/lists/oss-security/2011/12/09/5 - Mailing List () http://www.openwall.com/lists/oss-security/2011/12/09/5 - Mailing List
References () http://www.osvdb.org/77698 - Broken Link () http://www.osvdb.org/77698 - Broken Link
References () http://www.securityfocus.com/bid/51006 - Patch, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/51006 - Patch, Third Party Advisory, VDB Entry
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/71726 - VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/71726 - VDB Entry

Information

Published : 2012-06-21 15:55

Updated : 2024-11-21 01:32


NVD link : CVE-2011-4599

Mitre link : CVE-2011-4599

CVE.ORG link : CVE-2011-4599


JSON object : View

Products Affected

icu-project

  • international_components_for_unicode
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer