CVE-2012-3480

Multiple integer overflows in the (1) strtod, (2) strtof, (3) strtold, (4) strtod_l, and other unspecified "related functions" in stdlib in GNU C Library (aka glibc or libc6) 2.16 allow local users to cause a denial of service (application crash) and possibly execute arbitrary code via a long string, which triggers a stack-based buffer overflow.
References
Link Resource
http://lists.fedoraproject.org/pipermail/package-announce/2012-August/085190.html
http://osvdb.org/84710
http://rhn.redhat.com/errata/RHSA-2012-1207.html
http://rhn.redhat.com/errata/RHSA-2012-1208.html
http://rhn.redhat.com/errata/RHSA-2012-1262.html
http://rhn.redhat.com/errata/RHSA-2012-1325.html
http://secunia.com/advisories/50201 Vendor Advisory
http://secunia.com/advisories/50422
http://sourceware.org/bugzilla/show_bug.cgi?id=14459
http://sourceware.org/ml/libc-alpha/2012-08/msg00202.html
http://www.openwall.com/lists/oss-security/2012/08/13/4
http://www.openwall.com/lists/oss-security/2012/08/13/6
http://www.securityfocus.com/bid/54982
http://www.securitytracker.com/id?1027374
http://www.ubuntu.com/usn/USN-1589-1
https://security.gentoo.org/glsa/201503-04
http://lists.fedoraproject.org/pipermail/package-announce/2012-August/085190.html
http://osvdb.org/84710
http://rhn.redhat.com/errata/RHSA-2012-1207.html
http://rhn.redhat.com/errata/RHSA-2012-1208.html
http://rhn.redhat.com/errata/RHSA-2012-1262.html
http://rhn.redhat.com/errata/RHSA-2012-1325.html
http://secunia.com/advisories/50201 Vendor Advisory
http://secunia.com/advisories/50422
http://sourceware.org/bugzilla/show_bug.cgi?id=14459
http://sourceware.org/ml/libc-alpha/2012-08/msg00202.html
http://www.openwall.com/lists/oss-security/2012/08/13/4
http://www.openwall.com/lists/oss-security/2012/08/13/6
http://www.securityfocus.com/bid/54982
http://www.securitytracker.com/id?1027374
http://www.ubuntu.com/usn/USN-1589-1
https://security.gentoo.org/glsa/201503-04
Configurations

Configuration 1 (hide)

cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*

History

21 Nov 2024, 01:40

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2012-August/085190.html - () http://lists.fedoraproject.org/pipermail/package-announce/2012-August/085190.html -
References () http://osvdb.org/84710 - () http://osvdb.org/84710 -
References () http://rhn.redhat.com/errata/RHSA-2012-1207.html - () http://rhn.redhat.com/errata/RHSA-2012-1207.html -
References () http://rhn.redhat.com/errata/RHSA-2012-1208.html - () http://rhn.redhat.com/errata/RHSA-2012-1208.html -
References () http://rhn.redhat.com/errata/RHSA-2012-1262.html - () http://rhn.redhat.com/errata/RHSA-2012-1262.html -
References () http://rhn.redhat.com/errata/RHSA-2012-1325.html - () http://rhn.redhat.com/errata/RHSA-2012-1325.html -
References () http://secunia.com/advisories/50201 - Vendor Advisory () http://secunia.com/advisories/50201 - Vendor Advisory
References () http://secunia.com/advisories/50422 - () http://secunia.com/advisories/50422 -
References () http://sourceware.org/bugzilla/show_bug.cgi?id=14459 - () http://sourceware.org/bugzilla/show_bug.cgi?id=14459 -
References () http://sourceware.org/ml/libc-alpha/2012-08/msg00202.html - () http://sourceware.org/ml/libc-alpha/2012-08/msg00202.html -
References () http://www.openwall.com/lists/oss-security/2012/08/13/4 - () http://www.openwall.com/lists/oss-security/2012/08/13/4 -
References () http://www.openwall.com/lists/oss-security/2012/08/13/6 - () http://www.openwall.com/lists/oss-security/2012/08/13/6 -
References () http://www.securityfocus.com/bid/54982 - () http://www.securityfocus.com/bid/54982 -
References () http://www.securitytracker.com/id?1027374 - () http://www.securitytracker.com/id?1027374 -
References () http://www.ubuntu.com/usn/USN-1589-1 - () http://www.ubuntu.com/usn/USN-1589-1 -
References () https://security.gentoo.org/glsa/201503-04 - () https://security.gentoo.org/glsa/201503-04 -

Information

Published : 2012-08-25 10:29

Updated : 2024-11-21 01:40


NVD link : CVE-2012-3480

Mitre link : CVE-2012-3480

CVE.ORG link : CVE-2012-3480


JSON object : View

Products Affected

gnu

  • glibc
CWE
CWE-189

Numeric Errors