CVE-2014-6040

GNU C Library (aka glibc) before 2.20 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via a multibyte character value of "0xffff" to the iconv function when converting (1) IBM933, (2) IBM935, (3) IBM937, (4) IBM939, or (5) IBM1364 encoded data to UTF-8.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.18:*:*:*:*:*:*:*

History

21 Nov 2024, 02:13

Type Values Removed Values Added
References () http://linux.oracle.com/errata/ELSA-2015-0016.html - () http://linux.oracle.com/errata/ELSA-2015-0016.html -
References () http://secunia.com/advisories/62100 - () http://secunia.com/advisories/62100 -
References () http://secunia.com/advisories/62146 - () http://secunia.com/advisories/62146 -
References () http://ubuntu.com/usn/usn-2432-1 - Patch, Vendor Advisory () http://ubuntu.com/usn/usn-2432-1 - Patch, Vendor Advisory
References () http://www.debian.org/security/2015/dsa-3142 - Vendor Advisory () http://www.debian.org/security/2015/dsa-3142 - Vendor Advisory
References () http://www.mandriva.com/security/advisories?name=MDVSA-2014:175 - () http://www.mandriva.com/security/advisories?name=MDVSA-2014:175 -
References () http://www.openwall.com/lists/oss-security/2014/08/29/3 - () http://www.openwall.com/lists/oss-security/2014/08/29/3 -
References () http://www.openwall.com/lists/oss-security/2014/09/02/1 - Exploit () http://www.openwall.com/lists/oss-security/2014/09/02/1 - Exploit
References () http://www.securityfocus.com/bid/69472 - () http://www.securityfocus.com/bid/69472 -
References () https://security.gentoo.org/glsa/201602-02 - () https://security.gentoo.org/glsa/201602-02 -
References () https://sourceware.org/bugzilla/show_bug.cgi?id=17325 - Exploit () https://sourceware.org/bugzilla/show_bug.cgi?id=17325 - Exploit
References () https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=41488498b6 - () https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=41488498b6 -

Information

Published : 2014-12-05 16:59

Updated : 2024-11-21 02:13


NVD link : CVE-2014-6040

Mitre link : CVE-2014-6040

CVE.ORG link : CVE-2014-6040


JSON object : View

Products Affected

gnu

  • glibc
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer