[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256148

 
 

909

 
 

199106

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2013:162 -- Mandriva glibc

ID: oval:org.secpod.oval:def:1300194Date: (C)2013-05-08   (M)2023-12-07
Class: PATCHFamily: unix




Multiple vulnerabilities has been discovered and corrected in glibc: Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arguments . Multiple errors in glibc's formatted printing functionality could allow an attacker to bypass FORTIFY_SOURCE protections and execute arbitrary code using a format string flaw in an application, even though these protections are expected to limit the impact of such flaws to an application abort . Multiple integer overflows in the strtod, strtof, strtold, strtod_l, and other unspecified related functions in stdlib in GNU C Library 2.16 allow local users to cause a denial of service and possibly execute arbitrary code via a long string, which triggers a stack-based buffer overflow . Buffer overflow in the extend_buffers function in the regular expression matcher in glibc, possibly 2.17 and earlier, allows context-dependent attackers to cause a denial of service via crafted multibyte characters . Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library 2.17 and earlier allows remote attackers to cause a denial of service via a hostname or IP address that triggers a large number of domain conversion results . The updated packages have been patched to correct these issues.

Platform:
Mandriva Enterprise Server 5.2
Product:
glibc
Reference:
MDVSA-2013:162
CVE-2012-0864
CVE-2012-3404
CVE-2012-3405
CVE-2012-3406
CVE-2012-3480
CVE-2013-0242
CVE-2013-1914
CVE    7
CVE-2013-0242
CVE-2013-1914
CVE-2012-0864
CVE-2012-3405
...
CPE    1
cpe:/o:mandriva:enterprise_server:5.2

© SecPod Technologies