The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during a risk-management decision for use of the alloca function, which might allow context-dependent attackers to cause a denial of service (segmentation violation) or overwrite memory locations beyond the stack boundary via a long line containing wide characters that are improperly handled in a wscanf call.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 02:25
Type | Values Removed | Values Added |
---|---|---|
References | () http://openwall.com/lists/oss-security/2015/02/04/1 - | |
References | () http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html - | |
References | () http://www.securityfocus.com/bid/72499 - | |
References | () http://www.ubuntu.com/usn/USN-2519-1 - | |
References | () https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commit%3Bh=5bd80bfe9ca0d955bfbbc002781bc7b01b6bcb06 - |
07 Nov 2023, 02:24
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2015-04-08 10:59
Updated : 2024-11-21 02:25
NVD link : CVE-2015-1473
Mitre link : CVE-2015-1473
CVE.ORG link : CVE-2015-1473
JSON object : View
Products Affected
canonical
- ubuntu_linux
gnu
- glibc
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer