scanf and related functions in glibc before 2.15 allow local users to cause a denial of service (segmentation fault) via a large string of 0s.
References
Link | Resource |
---|---|
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=3f8cc204fdd0 | Issue Tracking |
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=20b38e0 | Issue Tracking |
https://sourceware.org/bugzilla/show_bug.cgi?id=13138#c4 | Issue Tracking |
https://bugzilla.redhat.com/show_bug.cgi?id=1196745 | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2015/03/12/14 | Third Party Advisory |
https://marc.info/?l=gimp-developer&m=129567990905823&w=2 | Exploit |
Configurations
Information
Published : 2017-10-18 07:29
Updated : 2017-11-08 09:05
NVD link : CVE-2011-5320
Mitre link : CVE-2011-5320
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
gnu
- glibc