Vulnerability CVE-2011-1071


Published: 2011-04-08   Modified: 2012-02-13

Description:
The GNU C Library (aka glibc or libc6) before 2.12.2 and Embedded GLIBC (EGLIBC) allow context-dependent attackers to execute arbitrary code or cause a denial of service (memory consumption) via a long UTF8 string that is used in an fnmatch call, aka a "stack extension attack," a related issue to CVE-2010-2898, CVE-2010-1917, and CVE-2007-4782, as originally reported for use of this library by Google Chrome.

See advisories in our WLB2 database:
Topic
Author
Date
High
GNU glibc < 2.12.2 alloca() Stack Corruption Vulnerability
Simon Berry-Byrn...
07.04.2011

Type:

CWE-399

(Resource Management Errors)

CVSS2 => (AV:N/AC:H/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5.1/10
6.4/10
4.9/10
Exploit range
Attack complexity
Authentication
Remote
High
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
GNU -> Eglibc 
GNU -> Glibc 

 References:
http://bugs.debian.org/615120
http://code.google.com/p/chromium/issues/detail?id=48733
http://openwall.com/lists/oss-security/2011/02/26/3
http://openwall.com/lists/oss-security/2011/02/28/11
http://openwall.com/lists/oss-security/2011/02/28/15
http://scarybeastsecurity.blogspot.com/2011/02/i-got-accidental-code-execution-via.html
http://seclists.org/fulldisclosure/2011/Feb/635
http://seclists.org/fulldisclosure/2011/Feb/644
http://securityreason.com/securityalert/8175
http://securitytracker.com/id?1025290
http://sourceware.org/bugzilla/show_bug.cgi?id=11883
http://sourceware.org/git/?p=glibc.git;a=commit;h=f15ce4d8dc139523fe0c273580b604b2453acba6
http://www.mandriva.com/security/advisories?name=MDVSA-2011:178
http://www.redhat.com/support/errata/RHSA-2011-0412.html
http://www.redhat.com/support/errata/RHSA-2011-0413.html
http://www.securityfocus.com/archive/1/520102/100/0/threaded
http://www.securityfocus.com/bid/46563
http://www.vmware.com/security/advisories/VMSA-2011-0012.html
http://www.vupen.com/english/advisories/2011/0863
https://bugzilla.redhat.com/show_bug.cgi?id=681054
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12853

Copyright 2024, cxsecurity.com

 

Back to Top