scanf and related functions in glibc before 2.15 allow local users to cause a denial of service (segmentation fault) via a large string of 0s.
References
Configurations
History
21 Nov 2024, 01:34
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2015/03/12/14 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1196745 - Third Party Advisory | |
References | () https://marc.info/?l=gimp-developer&m=129567990905823&w=2 - Exploit | |
References | () https://sourceware.org/bugzilla/show_bug.cgi?id=13138#c4 - Issue Tracking | |
References | () https://sourceware.org/git/?p=glibc.git%3Ba=commitdiff%3Bh=20b38e0 - | |
References | () https://sourceware.org/git/?p=glibc.git%3Ba=commitdiff%3Bh=3f8cc204fdd0 - |
07 Nov 2023, 02:09
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2017-10-18 14:29
Updated : 2024-11-21 01:34
NVD link : CVE-2011-5320
Mitre link : CVE-2011-5320
CVE.ORG link : CVE-2011-5320
JSON object : View
Products Affected
gnu
- glibc
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer