Vulnerability CVE-2012-3405


Published: 2014-02-10

Description:
The vfprintf function in stdio-common/vfprintf.c in libc in GNU C Library (aka glibc) 2.14 and other versions does not properly calculate a buffer length, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a denial of service (segmentation fault and crash) via a format string with a large number of format specifiers that triggers "desynchronization within the buffer size handling," a different vulnerability than CVE-2012-3404.

See advisories in our WLB2 database:
Topic
Author
Date
High
glibc 2.12 vfprintf function Multiple Vulnerabilities
Multiple
20.06.2014

Type:

CWE-189

(Numeric Errors)

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
None
Partial
Affected software
Redhat -> Enterprise virtualization 
Redhat -> Enterprise linux 
GNU -> Glibc 
Canonical -> Ubuntu linux 

 References:
http://rhn.redhat.com/errata/RHSA-2012-1098.html
http://rhn.redhat.com/errata/RHSA-2012-1200.html
http://www.openwall.com/lists/oss-security/2012/07/11/17
http://www.ubuntu.com/usn/USN-1589-1
https://bugzilla.redhat.com/show_bug.cgi?id=833704
https://security.gentoo.org/glsa/201503-04
https://sourceware.org/bugzilla/show_bug.cgi?id=13446

Copyright 2024, cxsecurity.com

 

Back to Top