Vulnerability CVE-2012-5667


Published: 2013-01-03

Description:
Multiple integer overflows in GNU Grep before 2.11 might allow context-dependent attackers to execute arbitrary code via vectors involving a long input line that triggers a heap-based buffer overflow.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
grep linux command memory corruption
Seth Arnold
22.12.2012

CVSS2 => (AV:L/AC:M/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.4/10
6.4/10
3.4/10
Exploit range
Attack complexity
Authentication
Local
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
GNU -> GREP 

 References:
http://git.savannah.gnu.org/cgit/grep.git/commit/?id=8fcf61523644df42e1905c81bed26838e0b04f91
http://git.savannah.gnu.org/cgit/grep.git/commit/?id=cbbc1a45b9f843c811905c97c90a5d31f8e6c189
http://git.sv.gnu.org/gitweb/?p=grep.git;a=shortlog;h=v2.11
http://lists.gnu.org/archive/html/bug-grep/2012-12/msg00004.html
http://openwall.com/lists/oss-security/2012/12/22/6
http://rhn.redhat.com/errata/RHSA-2015-1447.html
http://www.securityfocus.com/bid/57033
https://bugs.launchpad.net/ubuntu/+source/grep/+bug/1091473
https://bugzilla.redhat.com/show_bug.cgi?id=889935

Copyright 2024, cxsecurity.com

 

Back to Top